Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    08-03-2024 03:59

General

  • Target

    2024-03-08_ddfff4d000a0596b84f0b1640d3671bf_cryptolocker.exe

  • Size

    34KB

  • MD5

    ddfff4d000a0596b84f0b1640d3671bf

  • SHA1

    a6f3d9a661ad910c9478b2e8b93ac3867ce3302a

  • SHA256

    66cd994ceb70eaaad58118fd7d93eefe4cea95333a1ffd09b1eed17558055f2e

  • SHA512

    e97d09743fb6e9580558a491bf98f09fc2bbbcf9a70344c72865e1fc40f6032098bd88d62f7affddd405281ba4ecc42426becef0982695681f6f4ac828b33811

  • SSDEEP

    384:btBYQg/WIEhUCSNyepEjYnDOAlzVol6U/zzo+tkq4l8tFFxE2B0q64:btB9g/WItCSsAGjX7r3BTf

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-08_ddfff4d000a0596b84f0b1640d3671bf_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-08_ddfff4d000a0596b84f0b1640d3671bf_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:3048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\gewos.exe

    Filesize

    34KB

    MD5

    c0817d4b8f4244729bc73cce4b315a6a

    SHA1

    d154c5a5b6f80b250758de1bc4e0600140bf0fa9

    SHA256

    b2e8dc5ca338040e5698cb997c5bbccd5533083aa528189734d831de76dfade7

    SHA512

    ef311e09f95ade3aaf3e2b2415c847c994eebdb739dd09bdd347c5760f57ce77881c1198e200000caadec217535dcd7df36a68c3bb66491a8fccf19717e92fe5

  • memory/1740-0-0x00000000003C0000-0x00000000003C6000-memory.dmp

    Filesize

    24KB

  • memory/1740-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/1740-2-0x00000000003C0000-0x00000000003C6000-memory.dmp

    Filesize

    24KB

  • memory/3048-18-0x0000000000310000-0x0000000000316000-memory.dmp

    Filesize

    24KB