Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    26/04/2024, 03:27

General

  • Target

    2024-04-26_179d3282117255a548bd761c83d8d73f_cryptolocker.exe

  • Size

    63KB

  • MD5

    179d3282117255a548bd761c83d8d73f

  • SHA1

    60e6057f2e081134836d0bd84e46375e8c4e41ff

  • SHA256

    309015b766fa379cdf3ff5082854403334fff56c1cfe1ab9e2de40a06773a915

  • SHA512

    fb39c5374b4f0b18458c4fc63919093da62cabbdfa95b87339a209f92136bcc9e270b651d3efd153ba17f83c4475b70dc01f191105f8d11f6037dd50d193ce8f

  • SSDEEP

    1536:btB9g/xtCSKfxLIc//Xr+/AO/kIZ3ft2nVuTKB6nggOlHdUHaxO:btng54SMLr+/AO/kIhfoKMHdPO

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-26_179d3282117255a548bd761c83d8d73f_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-26_179d3282117255a548bd761c83d8d73f_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1508
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2528

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\gewos.exe

          Filesize

          63KB

          MD5

          15015535bd2cda369afbb05f48e9fbeb

          SHA1

          2819163913de2fd32d1eea243ad8da627f9ae24c

          SHA256

          bfff6d9d99fdf273333666ccf161f1ad19e61dee843fc400d101bf116fb0dd8b

          SHA512

          4eb604b7bd142b6ebddc72a87e8872842c0a09b5a62e8ab3a54c4b01b6a46f4ca55ee8544a01ba981dff6b5f5ed723a90bd619e4efe92eb8dcdb3e93b23a42d4

        • memory/1508-0-0x00000000003E0000-0x00000000003E6000-memory.dmp

          Filesize

          24KB

        • memory/1508-1-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/1508-2-0x00000000003E0000-0x00000000003E6000-memory.dmp

          Filesize

          24KB

        • memory/2528-17-0x0000000000290000-0x0000000000296000-memory.dmp

          Filesize

          24KB