Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30/04/2024, 17:30
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-30_cd6986982567d6eb7f34b6c37470c57f_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-30_cd6986982567d6eb7f34b6c37470c57f_cryptolocker.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-04-30_cd6986982567d6eb7f34b6c37470c57f_cryptolocker.exe
-
Size
39KB
-
MD5
cd6986982567d6eb7f34b6c37470c57f
-
SHA1
da5b5f9b03d5a01a1a5412e4536a7136f417c721
-
SHA256
76d96440920903feab31a57db74faa6e6669bf0162909f9d82bddc167b4f8e94
-
SHA512
0b7dc9456e2667ba339d820a797fecc822134bcbc0325d88a317e6e75851a8cf68fc81720418f29208a829bd5c5e658e1dd7145b8135f93c111cc962a08018b8
-
SSDEEP
384:btBYQg/WIEhUCSNyepEjYnDOAlzVol6U/zzo+tkq4XDIwNiJXxXunKzH15U/EG:btB9g/WItCSsAGjX7e9N0hunKLYp
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000c00000001340b-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2504 gewos.exe -
Loads dropped DLL 1 IoCs
pid Process 2000 2024-04-30_cd6986982567d6eb7f34b6c37470c57f_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2000 2024-04-30_cd6986982567d6eb7f34b6c37470c57f_cryptolocker.exe 2504 gewos.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2504 2000 2024-04-30_cd6986982567d6eb7f34b6c37470c57f_cryptolocker.exe 28 PID 2000 wrote to memory of 2504 2000 2024-04-30_cd6986982567d6eb7f34b6c37470c57f_cryptolocker.exe 28 PID 2000 wrote to memory of 2504 2000 2024-04-30_cd6986982567d6eb7f34b6c37470c57f_cryptolocker.exe 28 PID 2000 wrote to memory of 2504 2000 2024-04-30_cd6986982567d6eb7f34b6c37470c57f_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-30_cd6986982567d6eb7f34b6c37470c57f_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-30_cd6986982567d6eb7f34b6c37470c57f_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\gewos.exe"C:\Users\Admin\AppData\Local\Temp\gewos.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5b223615543e2f62b83cdb49fe41a09c3
SHA1654af7ee4ae25c5df26a9d8fa02ae073cc82f69c
SHA256f24722a138cc43d073766c914ec26d570f807b6fd29c1c0aae912743f14b75c8
SHA512714de50d54b2de57c43f3f2795685fd2709c1deceb3033808906459857cc4bf97edbbf2503898dc6d35ed0a6ebfe11394bc70d9e6702ed0f2f8d0fa49be4b560