Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-03-2024 17:40
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-28_c75b6da235f3efe1cc56fdb7af5c58c3_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-28_c75b6da235f3efe1cc56fdb7af5c58c3_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-28_c75b6da235f3efe1cc56fdb7af5c58c3_cryptolocker.exe
-
Size
36KB
-
MD5
c75b6da235f3efe1cc56fdb7af5c58c3
-
SHA1
57146b69398fecf2dba4468ea8194f7ded41d650
-
SHA256
b64bf57c9e057c30d604d94bb2c86d76f56f9d20984555a587e85c34b83f73f0
-
SHA512
d6cf2ad2c8f4e83ec1e3a3261706d9982980ccc710fdfc1f7ef4c3dd28b3a1c8f47094cd4dd26a409003a13b8a7f93985f1745617c7c194e31d5e93de7b29b48
-
SSDEEP
384:btBYQg/WIEhUCSNyepEjYnDOAlzVol6U/zzo+tkq4l8tFFxE2B0q8Elk8DoE:btB9g/WItCSsAGjX7r3BT9lkU
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000d000000014466-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2692 gewos.exe -
Loads dropped DLL 1 IoCs
pid Process 2760 2024-03-28_c75b6da235f3efe1cc56fdb7af5c58c3_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2760 2024-03-28_c75b6da235f3efe1cc56fdb7af5c58c3_cryptolocker.exe 2692 gewos.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2760 wrote to memory of 2692 2760 2024-03-28_c75b6da235f3efe1cc56fdb7af5c58c3_cryptolocker.exe 28 PID 2760 wrote to memory of 2692 2760 2024-03-28_c75b6da235f3efe1cc56fdb7af5c58c3_cryptolocker.exe 28 PID 2760 wrote to memory of 2692 2760 2024-03-28_c75b6da235f3efe1cc56fdb7af5c58c3_cryptolocker.exe 28 PID 2760 wrote to memory of 2692 2760 2024-03-28_c75b6da235f3efe1cc56fdb7af5c58c3_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_c75b6da235f3efe1cc56fdb7af5c58c3_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-28_c75b6da235f3efe1cc56fdb7af5c58c3_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\gewos.exe"C:\Users\Admin\AppData\Local\Temp\gewos.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5b1ce55e11522ac169df49a16bafa8bb4
SHA1e766adf0046a9d1e6cae3cab4ee4fd790094d3a5
SHA2569c72efbdc08f5f54ba50d9613cdc0561d11a99a84762385f5b89e7cb798ce374
SHA51256d75415f7af916085a0129b75a2077f9d79d5e679291f4a47f708d7135cf51b80161169946dc857396c34b4d0986cdb5c0fd6b1d8cf45e0c582b562a090d449