Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/02/2024, 05:36

General

  • Target

    2024-02-28_9b5be67c8abdc532b60b2b7928d673ea_cryptolocker.exe

  • Size

    46KB

  • MD5

    9b5be67c8abdc532b60b2b7928d673ea

  • SHA1

    8575cd8c6203af17f313378da523ecda1092515d

  • SHA256

    af3f2689ecb1308c8bc456defb4f8d067dd272510a50463f8937b70bb12eaa4c

  • SHA512

    21598ba821fee33941539d8503b6a48474ee1585432b11795ad35db1fdaa2fb7b22cd2b4b86e828d026906d5cdbdca092bc91b8d20bea8252f6f6da75997fbdb

  • SSDEEP

    768:btB9g/WItCSsAGjX7r3BPOMHoc/QQJP5q4Sq:btB9g/xtCSKfxLIc/C4Z

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-28_9b5be67c8abdc532b60b2b7928d673ea_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-28_9b5be67c8abdc532b60b2b7928d673ea_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2256

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\gewos.exe

          Filesize

          46KB

          MD5

          af4fc1a30429a50bb6e8171a356a472e

          SHA1

          d0d77249e94c369db36578cc4b2441571d733443

          SHA256

          b15f84e0fb169b97bdd0d679ab61a0e02b7121a06a047b6743c2d665e7ddcc53

          SHA512

          23a2409b620e3d631c1a4cae2c8d414c32fdaa99681f5575131fdab46c4f6b2b86b9fae630eb7dc21380e01b38a0a8639b16659f4550b965dcf334b1a435e1af

        • memory/1968-0-0x00000000003E0000-0x00000000003E6000-memory.dmp

          Filesize

          24KB

        • memory/1968-1-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/1968-8-0x00000000003E0000-0x00000000003E6000-memory.dmp

          Filesize

          24KB

        • memory/2256-22-0x0000000000360000-0x0000000000366000-memory.dmp

          Filesize

          24KB