Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
28-03-2024 09:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-28_7b73b71d70ab81fee787bb709eccec9f_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-03-28_7b73b71d70ab81fee787bb709eccec9f_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-28_7b73b71d70ab81fee787bb709eccec9f_cryptolocker.exe
-
Size
58KB
-
MD5
7b73b71d70ab81fee787bb709eccec9f
-
SHA1
6bf0e531fa8ebcc12fc4951885598e4ed4ea1d4a
-
SHA256
262fe3fe546ab4321c8660bde7da9c1811f801b7cbfb41db74672dfda1afdebd
-
SHA512
dc197714c39b227ae8009de5ba84639aded2c6b8a9b49a5bc14583f2bee6ec18a40c97232eb2c08257355837ab7d1da27c81b1e655f7902964f2ee9a89fdca47
-
SSDEEP
1536:btB9g/xtCSKfxLIc//Xr+/AO/kIZ3ft2nVuTKB6nggOlHdUHTf:btng54SMLr+/AO/kIhfoKMHdu
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000a000000012252-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2664 gewos.exe -
Loads dropped DLL 1 IoCs
pid Process 1772 2024-03-28_7b73b71d70ab81fee787bb709eccec9f_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1772 2024-03-28_7b73b71d70ab81fee787bb709eccec9f_cryptolocker.exe 2664 gewos.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1772 wrote to memory of 2664 1772 2024-03-28_7b73b71d70ab81fee787bb709eccec9f_cryptolocker.exe 28 PID 1772 wrote to memory of 2664 1772 2024-03-28_7b73b71d70ab81fee787bb709eccec9f_cryptolocker.exe 28 PID 1772 wrote to memory of 2664 1772 2024-03-28_7b73b71d70ab81fee787bb709eccec9f_cryptolocker.exe 28 PID 1772 wrote to memory of 2664 1772 2024-03-28_7b73b71d70ab81fee787bb709eccec9f_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_7b73b71d70ab81fee787bb709eccec9f_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-28_7b73b71d70ab81fee787bb709eccec9f_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\gewos.exe"C:\Users\Admin\AppData\Local\Temp\gewos.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD5e4571e950ba235132ca6fb375089950e
SHA1ace970860902bef13c2e5b99ac1a9e7a4ac66c76
SHA2567adb7e73b02ac9f2f4830420464d20f407ce70c8ac7a1d32a3eb619eb7ef5e5c
SHA51210003f59d27d25362ca0a74e53dd5b212cb1efbfb69df37c9baf1c9a1ca0aa04190665c6579b0b312103a3ab7bdaa55baf202b6f0ffb4cf1f8ca9b00940e394c