Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
03-05-2024 05:51
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-03_a55dfb700a459c4b2a0f8c3d0751b2b3_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-05-03_a55dfb700a459c4b2a0f8c3d0751b2b3_cryptolocker.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-05-03_a55dfb700a459c4b2a0f8c3d0751b2b3_cryptolocker.exe
-
Size
40KB
-
MD5
a55dfb700a459c4b2a0f8c3d0751b2b3
-
SHA1
bb921967878d16507363e79805b8a1f8af19d4dc
-
SHA256
4720d02b47e857682064192b8588d2aeedd2c912529fd696bb872ee9226268ef
-
SHA512
f3d3b602b2922ed8f629e234af49dc3307d7eed0d323bf9f72208d70ac45f8befa86f4aabf2d7ffd39aac0903f894c37263de4cf76313186d8c07b93c0ffe3b5
-
SSDEEP
384:btBYQg/WIEhUCSNyepEjYnDOAlzVol6U/zzo+tkq4XDIwNiJXxXunKzH15U/Ez:btB9g/WItCSsAGjX7e9N0hunKLYY
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000a000000015cbd-13.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2368 gewos.exe -
Loads dropped DLL 1 IoCs
pid Process 1512 2024-05-03_a55dfb700a459c4b2a0f8c3d0751b2b3_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1512 2024-05-03_a55dfb700a459c4b2a0f8c3d0751b2b3_cryptolocker.exe 2368 gewos.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1512 wrote to memory of 2368 1512 2024-05-03_a55dfb700a459c4b2a0f8c3d0751b2b3_cryptolocker.exe 28 PID 1512 wrote to memory of 2368 1512 2024-05-03_a55dfb700a459c4b2a0f8c3d0751b2b3_cryptolocker.exe 28 PID 1512 wrote to memory of 2368 1512 2024-05-03_a55dfb700a459c4b2a0f8c3d0751b2b3_cryptolocker.exe 28 PID 1512 wrote to memory of 2368 1512 2024-05-03_a55dfb700a459c4b2a0f8c3d0751b2b3_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-03_a55dfb700a459c4b2a0f8c3d0751b2b3_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-03_a55dfb700a459c4b2a0f8c3d0751b2b3_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\gewos.exe"C:\Users\Admin\AppData\Local\Temp\gewos.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD52da95d51aa4a01fe05ad8f208dff40bd
SHA12bbcb9a60fefd91513f6291b29c0f7bdd9ed54c1
SHA25651ef78389b1e5d645dc728e20282a68be6c2b968125cae8f878fface7c053c96
SHA512aed0c4eeeefc5aa2df09f6c91a489e7c86c86b98d105091ee3e27516a78ce30544613e0a2e16313a594fd178391f91a96addde2e87d11ab6aa7a70339d14473a