Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
26-04-2024 18:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-26_44a21bf0fd719fb38667066a7f4179fd_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-04-26_44a21bf0fd719fb38667066a7f4179fd_cryptolocker.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-04-26_44a21bf0fd719fb38667066a7f4179fd_cryptolocker.exe
-
Size
61KB
-
MD5
44a21bf0fd719fb38667066a7f4179fd
-
SHA1
e70d8c80cba7ecec288fa6077df24df64535a027
-
SHA256
6758e504ba1f9fd2725b302d5143955e517816ff92c615a7543c79527f1caf80
-
SHA512
3a90f7221ee827d6dcb6cab2294460fea65467ec1b5aac0f8725bb9a77153700111b5d4f553d46cfc3a9a70b2917cd5b027709fdb44da330397f57075ed9c4f1
-
SSDEEP
1536:btB9g/xtCSKfxLIc//Xr+/AO/kIZ3ft2nVuTKB6nggOlHdUHZnan:btng54SMLr+/AO/kIhfoKMHda4
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000c000000015cce-14.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2368 gewos.exe -
Loads dropped DLL 1 IoCs
pid Process 384 2024-04-26_44a21bf0fd719fb38667066a7f4179fd_cryptolocker.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 384 2024-04-26_44a21bf0fd719fb38667066a7f4179fd_cryptolocker.exe 2368 gewos.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 384 wrote to memory of 2368 384 2024-04-26_44a21bf0fd719fb38667066a7f4179fd_cryptolocker.exe 28 PID 384 wrote to memory of 2368 384 2024-04-26_44a21bf0fd719fb38667066a7f4179fd_cryptolocker.exe 28 PID 384 wrote to memory of 2368 384 2024-04-26_44a21bf0fd719fb38667066a7f4179fd_cryptolocker.exe 28 PID 384 wrote to memory of 2368 384 2024-04-26_44a21bf0fd719fb38667066a7f4179fd_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-26_44a21bf0fd719fb38667066a7f4179fd_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-26_44a21bf0fd719fb38667066a7f4179fd_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Admin\AppData\Local\Temp\gewos.exe"C:\Users\Admin\AppData\Local\Temp\gewos.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2368
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5f3e6353833d26b55fef953f0d61f928b
SHA1463d01f285f393653b038dcf76a66e4569cfb469
SHA256cfbbc1e7b2ae52b678b29b2d658cccc2baa179d53828984164cd784368fc6699
SHA512e65b18ff68c6ed85b1d1e32f9535a272ddaa8a8e669489dee2cebc996f92d46fdef0d737c5669a4d1169067ef21fd6c9bac04cd66ea80aff5603c60f5654b8ec