Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    04/05/2024, 04:56

General

  • Target

    2024-05-04_b299ae6617adf98ebe0a803b92e54b0f_cryptolocker.exe

  • Size

    38KB

  • MD5

    b299ae6617adf98ebe0a803b92e54b0f

  • SHA1

    f20ee52793e5924e52c7fac419bb8a8b18fec0b0

  • SHA256

    ff5229a76a914f63b89c07915037821615359b1e5ba88ada95e0c1437aa1556d

  • SHA512

    8d12b30642fed60fa2e82161e1682f1f113ef03211274bfbd5104c2f37b13d443aa8ed100d58f4f73117ba066a29500c0e1c25da711773a8f456b4aa7f7ea826

  • SSDEEP

    384:btBYQg/WIEhUCSNyepEjYnDOAlzVol6U/zzo+tkq4XDIwNiJXxXunRSyHmYvV8d:btB9g/WItCSsAGjX7e9N0hunRvGIV8d

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-04_b299ae6617adf98ebe0a803b92e54b0f_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-04_b299ae6617adf98ebe0a803b92e54b0f_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2964
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2552

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\gewos.exe

          Filesize

          38KB

          MD5

          f2aeffdebe723d5525a0398ab53f1d7a

          SHA1

          4e6d2732d53f66ee2e42110eaf9d7943c2f6ea2e

          SHA256

          b156d7dc0a99b82ff0c098346dd6b98c7adf96dc0aff4860d0bb9b38cd0d10c2

          SHA512

          6183c3cef853f5e6f61dda145dc6a0b0848d193be4d851eb1f3bd79aaca934c387ec35ef1f54e92ce23d9627d8e4726e60bee8d42626010d14cab42296ccefc8

        • memory/2552-23-0x0000000000300000-0x0000000000306000-memory.dmp

          Filesize

          24KB

        • memory/2964-0-0x0000000000360000-0x0000000000366000-memory.dmp

          Filesize

          24KB

        • memory/2964-1-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/2964-8-0x0000000000360000-0x0000000000366000-memory.dmp

          Filesize

          24KB