Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    09-03-2024 17:45

General

  • Target

    2024-03-09_e198d9b93ef99fd1b97ba2861ee6e21e_cryptolocker.exe

  • Size

    59KB

  • MD5

    e198d9b93ef99fd1b97ba2861ee6e21e

  • SHA1

    037e4c5bcd840f1bc8b55e185d3816bbdba1acdf

  • SHA256

    2ae82dcda31569c1502ff35952bb31f71e911cf0bb1265ce2e8f04f35e3c0135

  • SHA512

    174d6ae605a739a5b50e67403f594a4b718cdfd74f1e400b3a419da47912ed630a4f878ea2069906bc8d01777d125d21979127de5af625f9845c46df5abfb9a4

  • SSDEEP

    1536:btB9g/xtCSKfxLIc//Xr+/AO/kIZ3ft2nVuTKB6nggOlHdUHg:btng54SMLr+/AO/kIhfoKMHd5

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-09_e198d9b93ef99fd1b97ba2861ee6e21e_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-09_e198d9b93ef99fd1b97ba2861ee6e21e_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2280
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2148

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\gewos.exe

    Filesize

    59KB

    MD5

    16f516b951a185d69c1bcd87a733160c

    SHA1

    7a82b30fa01e1c259cf553ffabc3a6cf167b8104

    SHA256

    fe59a1b742559bb6918da62e2780a3c59ea6d71d6e51e3bb334ce6d3cf956896

    SHA512

    a0b315dfff247be44a503883c4a3cfdc2bbddc28eef8310a855366770d21d01f99973f51d25be546592274a4c85a156c1572721a0cf27d350b89783db53f9426

  • memory/2148-23-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB

  • memory/2280-0-0x0000000000300000-0x0000000000306000-memory.dmp

    Filesize

    24KB

  • memory/2280-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2280-3-0x0000000000300000-0x0000000000306000-memory.dmp

    Filesize

    24KB