Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    12/05/2024, 13:52

General

  • Target

    2024-05-12_f19d06de4cc21ede20ed9e261ed8bfc3_cryptolocker.exe

  • Size

    40KB

  • MD5

    f19d06de4cc21ede20ed9e261ed8bfc3

  • SHA1

    25516697896b2a69c36ad9cd233b750e3bf1b497

  • SHA256

    f685648d4fc999b9835872c746875babc1926e7d013821da3ee7270ba0217307

  • SHA512

    593d6ea15d4d21cb57f5d730045b0ace386518b1e81cec43f9c22e9a6a6a6154ee584387a6311f1bf4443118263f7f2b9adfde1c8cf87797ff50583e633f6506

  • SSDEEP

    384:btBYQg/WIEhUCSNyepEjYnDOAlzVol6U/zzo+tkq4XDIwNiJXxXunKzH15U/E8RK:btB9g/WItCSsAGjX7e9N0hunKLYdRK

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-12_f19d06de4cc21ede20ed9e261ed8bfc3_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-12_f19d06de4cc21ede20ed9e261ed8bfc3_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3028
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:1208

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\gewos.exe

          Filesize

          41KB

          MD5

          3a6ac546cbebd309c6e432b324b70ccd

          SHA1

          8d5b540c3ee03aa9f81aba575d325263ccc2a20d

          SHA256

          b7d6b3375c80057a558b5d20668ed9f275796b339c0e7fdeff90ebe3aee2f5b1

          SHA512

          e7e9c25d0a9704799e588fdade360dbf0e81436c3b7c1026a10b3ad9a4413abd8f47ec86bab55731927813564b9d18806a82a1cc39135e25fb19b1bafcc8d40a

        • memory/1208-23-0x0000000000280000-0x0000000000286000-memory.dmp

          Filesize

          24KB

        • memory/3028-0-0x0000000000350000-0x0000000000356000-memory.dmp

          Filesize

          24KB

        • memory/3028-8-0x0000000000350000-0x0000000000356000-memory.dmp

          Filesize

          24KB

        • memory/3028-1-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB