Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05/04/2024, 04:05

General

  • Target

    2024-04-05_c3a8d57a9e54d4cc1d679e4279468820_cryptolocker.exe

  • Size

    58KB

  • MD5

    c3a8d57a9e54d4cc1d679e4279468820

  • SHA1

    feb4af83e491f8311a25e5cb5c908f1f3541eebb

  • SHA256

    9cf3a7438949b73f2064cb7fce9192fdd49bde2d3236ddbddce4d7c0df7cd9f5

  • SHA512

    e05be828e218d4ec51acacfaa2dd1319ecfc5647fe7d8ae438f98b6a9a4f3a07e7cc4b1ee876e89092cc3e2a19795fe16562c149d37e092387292a27dfef6181

  • SSDEEP

    1536:btB9g/xtCSKfxLIc//Xr+/AO/kIZ3ft2nVuTKB6nggOlHdUH6/:btng54SMLr+/AO/kIhfoKMHdJ

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-05_c3a8d57a9e54d4cc1d679e4279468820_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-05_c3a8d57a9e54d4cc1d679e4279468820_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:844
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:3052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\gewos.exe

    Filesize

    58KB

    MD5

    42b4142f7b152b25c87bb4c4eef42b8c

    SHA1

    a0b3f8dd76abc9feceb6cafeb81e7b8e5e066199

    SHA256

    13692bbea2d9034453d37db1f687f8b4d3da8076876e6a36437f29216235ae46

    SHA512

    1fbb518294527b95564d06a9df27b34b8aec8353d26724633a37f9d4248e8039cce7645922455e0ee72177032e4689239d5e24e57380f13f4e58a2480436fe51

  • memory/844-0-0x00000000002F0000-0x00000000002F6000-memory.dmp

    Filesize

    24KB

  • memory/844-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/844-3-0x00000000002F0000-0x00000000002F6000-memory.dmp

    Filesize

    24KB

  • memory/3052-18-0x00000000001F0000-0x00000000001F6000-memory.dmp

    Filesize

    24KB