Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    21/05/2024, 08:43

General

  • Target

    2024-05-21_33aae13b63eccf63a03fe77fb1956d8e_cryptolocker.exe

  • Size

    62KB

  • MD5

    33aae13b63eccf63a03fe77fb1956d8e

  • SHA1

    7ffcb21e233879e05ee5a9c69b9366f583934237

  • SHA256

    36afe97717751600e706943570c68abc1ce52c5ae74553a9a763f426ca09627d

  • SHA512

    0221d6ddc0c054a9cd4f3813c7ee5d7e91e684c73ddd3270ba17c40e14f5c9b46282f1a8a29bfe9520bad61ddeafaa4f3ba68b6dfbb257b5b983d62a32c0c978

  • SSDEEP

    1536:btB9g/xtCSKfxLIc//Xr+/AO/kIZ3ft2nVuTKB6nggOlHdUHZnxi:btng54SMLr+/AO/kIhfoKMHdag

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-21_33aae13b63eccf63a03fe77fb1956d8e_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-21_33aae13b63eccf63a03fe77fb1956d8e_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2176

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\gewos.exe

    Filesize

    62KB

    MD5

    f3e5b745c9740091a065105e61f0c566

    SHA1

    ec5ccb6c89bfcf9bdc71b1e6d8d3305bac161582

    SHA256

    7714b388db5eb1bee6b6ea2378d52765319a0e4fc0be2bb9e034481b448f8133

    SHA512

    1c44c2d583db2eec07d337001ad5e694761a110eeb68c6af878a659ff1731622fbcdd598b40e4b12fb4c00811034d8f3877ac104f3b70244f1c51c50ee012560

  • memory/2176-23-0x0000000000380000-0x0000000000386000-memory.dmp

    Filesize

    24KB

  • memory/2192-8-0x0000000000340000-0x0000000000346000-memory.dmp

    Filesize

    24KB

  • memory/2192-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2192-0-0x0000000000340000-0x0000000000346000-memory.dmp

    Filesize

    24KB