Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    16/04/2024, 07:33

General

  • Target

    2024-04-16_49b33d961590717e695ef6966da920e5_cryptolocker.exe

  • Size

    39KB

  • MD5

    49b33d961590717e695ef6966da920e5

  • SHA1

    08d1c34803352ac2061258cf85103aa8ad8c9efc

  • SHA256

    1e43c502b5fd8b2825fb74e06bc28abcdb5239e38607ea982f0d0111ba1ab064

  • SHA512

    39f29a24df562f48a00f3ef4677ed01fbe59545f0e078181becc5e5ed3f03292ba9324eef7c285cc58b4696c2d90eb0ed6f8c2e5db9d041db0396eef29f799fc

  • SSDEEP

    384:btBYQg/WIEhUCSNyepEjYnDOAlzVol6U/zzo+tkq4XDIwNiJXxXunKzH15U/EK:btB9g/WItCSsAGjX7e9N0hunKLYt

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-16_49b33d961590717e695ef6966da920e5_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-16_49b33d961590717e695ef6966da920e5_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2996
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2552

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          68KB

          MD5

          29f65ba8e88c063813cc50a4ea544e93

          SHA1

          05a7040d5c127e68c25d81cc51271ffb8bef3568

          SHA256

          1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

          SHA512

          e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

        • \Users\Admin\AppData\Local\Temp\gewos.exe

          Filesize

          39KB

          MD5

          f8a4ba517e9c20ec268ecf523220fa3d

          SHA1

          fa066c97cc1db70116d04d6ebfb037192ca5c2f8

          SHA256

          91907899796aefc886acde6934989c0c800e5c1a98550eb5a672fe4930a490e8

          SHA512

          3ae6d161aaf3de2e9042e5e7fe580f77a33123b5ef550485158c938026b985ac12aa904ff1f2d5d85e45e94efd4d35354d604f0d81eac57904d88b94a404f7c3

        • memory/2552-18-0x00000000002C0000-0x00000000002C6000-memory.dmp

          Filesize

          24KB

        • memory/2996-0-0x0000000000290000-0x0000000000296000-memory.dmp

          Filesize

          24KB

        • memory/2996-2-0x0000000000290000-0x0000000000296000-memory.dmp

          Filesize

          24KB

        • memory/2996-1-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB