Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/02/2024, 04:40
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-24_51c6328be82ffc76f1b93e879782dbd5_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-24_51c6328be82ffc76f1b93e879782dbd5_cryptolocker.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-24_51c6328be82ffc76f1b93e879782dbd5_cryptolocker.exe
-
Size
36KB
-
MD5
51c6328be82ffc76f1b93e879782dbd5
-
SHA1
9d79798a29af9f25fa294638722ec938980ffbbd
-
SHA256
dd665cfcaba829cb1e93e62c8bd452e9966193da83fa31332f348e801b277ee6
-
SHA512
a35d8c28f8c0bb9c63c678bf43fce1dc8c5a637da2a06e68e5e08119dee3b8db255f638b95750fe69ae2f0c2fcbf34cdf51e5aeceb7d48086f2c2675a35afa83
-
SSDEEP
384:btBYQg/WIEhUCSNyepEjYnDOAlzVol6U/zzo+tkq4XDIwNiJXxXunKUf1g:btB9g/WItCSsAGjX7e9N0hunKUe
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000c000000012302-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 3032 gewos.exe -
Loads dropped DLL 1 IoCs
pid Process 2400 2024-02-24_51c6328be82ffc76f1b93e879782dbd5_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2400 2024-02-24_51c6328be82ffc76f1b93e879782dbd5_cryptolocker.exe 3032 gewos.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2400 wrote to memory of 3032 2400 2024-02-24_51c6328be82ffc76f1b93e879782dbd5_cryptolocker.exe 28 PID 2400 wrote to memory of 3032 2400 2024-02-24_51c6328be82ffc76f1b93e879782dbd5_cryptolocker.exe 28 PID 2400 wrote to memory of 3032 2400 2024-02-24_51c6328be82ffc76f1b93e879782dbd5_cryptolocker.exe 28 PID 2400 wrote to memory of 3032 2400 2024-02-24_51c6328be82ffc76f1b93e879782dbd5_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-24_51c6328be82ffc76f1b93e879782dbd5_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-24_51c6328be82ffc76f1b93e879782dbd5_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\gewos.exe"C:\Users\Admin\AppData\Local\Temp\gewos.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5b939068dfa7aa0148356d6209fe0baf0
SHA119e49040f85da0ea95b3d1f82861d71171595a90
SHA25665363b558b512a1253099eeb77f9424e7b2e1893f7b22e8c54e81c7a1bf30d0f
SHA512aa87aada67efd24b9df6b804750f89ae567513848d3da795e2214d98224c916838287ffffdb67e9b531e0dc0a328f34baf2853fef1d6e523f49916889f8de714