Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22/02/2024, 06:00

General

  • Target

    2024-02-22_a4948b4dca7650df469d9cbe91ded604_cryptolocker.exe

  • Size

    60KB

  • MD5

    a4948b4dca7650df469d9cbe91ded604

  • SHA1

    f6ff61f393f0894edcbaab55465ca5a81fb1f043

  • SHA256

    d808719d27dc0f8cd6c37df221414131f99cb343364c194c574e35af9eedec28

  • SHA512

    e4511487a6b877d221802392961c00d44a0efa5df0cdb027ba327e8f6f1e8035b4a9ec7a537d613313505262eaf791133dcf0964763002d43528b8ed75b74afc

  • SSDEEP

    1536:btB9g/xtCSKfxLIc//Xr+/AO/kIZ3ft2nVuTKB6nggOlHdUHX:btng54SMLr+/AO/kIhfoKMHda

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-22_a4948b4dca7650df469d9cbe91ded604_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-22_a4948b4dca7650df469d9cbe91ded604_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:952
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2212

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\gewos.exe

          Filesize

          60KB

          MD5

          1d47b1eb0e2a8cda3fbf49be4c6a70d4

          SHA1

          1d93103a1a51d9a9bd11ad9ed71750f0fdd664a1

          SHA256

          c58928e42d76f2cd1bc1543fa7c8b87cdec2d2ed3f2928e1894adac219cd34a5

          SHA512

          0682d44446ede9faa951484bd4578f87ab688f9d990cf2fee1b0bf3973258ca0c8bb608ce686ccc0349a66dd949ea7519a049a90bc0aeb4b5b99095c7f8dfe8f

        • memory/952-0-0x00000000002A0000-0x00000000002A6000-memory.dmp

          Filesize

          24KB

        • memory/952-1-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/952-7-0x00000000002A0000-0x00000000002A6000-memory.dmp

          Filesize

          24KB

        • memory/2212-23-0x0000000000260000-0x0000000000266000-memory.dmp

          Filesize

          24KB