Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27/04/2024, 19:00

General

  • Target

    2024-04-27_defd826f191dc68dbab042e56ce58561_cryptolocker.exe

  • Size

    63KB

  • MD5

    defd826f191dc68dbab042e56ce58561

  • SHA1

    dcd453912ba7f112b6b0279c21cc92f5e7dd0556

  • SHA256

    6ae232f6f65e08b34e9f51df4a9840a1bcca00088c5b9b53ece7de7d87f59498

  • SHA512

    02e48e075b24523169d80042bb9e6d679d03deeec4238ee73d3d356cd3ded9189eeba0534dd4ccc0ec4782e122ea314d648c4469065f2a3b58fb90d1b0ec5b48

  • SSDEEP

    1536:btB9g/xtCSKfxLIc//Xr+/AO/kIZ3ft2nVuTKB6nggOlHdUHax6:btng54SMLr+/AO/kIhfoKMHdP6

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-27_defd826f191dc68dbab042e56ce58561_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-27_defd826f191dc68dbab042e56ce58561_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1888
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\gewos.exe

    Filesize

    63KB

    MD5

    711438140ed3b9b64b7b95b412c72a32

    SHA1

    ff459b9cf257ac5876941d4c363fbc73e9fc7634

    SHA256

    7fc94ba9e0fd145d8536ac22d3105cfc0f196fd32794b7517da69366b609d9f1

    SHA512

    faa1f29399a7dd7929af1084d147f0a43a503d73b35f6a39f7892672814cdf725c8fbbc9d20fc7a2413034141a4e3ede049304e8ffd292a6a19105ad7ef3f4c8

  • memory/1888-8-0x00000000003D0000-0x00000000003D6000-memory.dmp

    Filesize

    24KB

  • memory/1888-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/1888-0-0x00000000003D0000-0x00000000003D6000-memory.dmp

    Filesize

    24KB

  • memory/2972-23-0x0000000000490000-0x0000000000496000-memory.dmp

    Filesize

    24KB