Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:33
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-22_e71d3f228d2d57e3c405b2c778a3efad_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-22_e71d3f228d2d57e3c405b2c778a3efad_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-22_e71d3f228d2d57e3c405b2c778a3efad_cryptolocker.exe
-
Size
38KB
-
MD5
e71d3f228d2d57e3c405b2c778a3efad
-
SHA1
efbb97a2414633cf7ce71f3b50d22f9a430704b8
-
SHA256
8a9449e107fa9bc3a688f1d3ab2523eae88ee249165b4608c4c7267016ca4c33
-
SHA512
e164747cb659b083a5708c9dd9d2933d591ea1cbb4aa83661af990743fee1db8d0aa6739b7654b72a7ad7e00bd1dde223b29e02e0f9858e14ac2a60c9b163b96
-
SSDEEP
384:btBYQg/WIEhUCSNyepEjYnDOAlzVol6U/zzo+tkq4XDIwNiJXxXunRSy3Vq:btB9g/WItCSsAGjX7e9N0hunRv0
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\gewos.exe CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
Processes:
gewos.exepid process 1932 gewos.exe -
Loads dropped DLL 1 IoCs
Processes:
2024-05-22_e71d3f228d2d57e3c405b2c778a3efad_cryptolocker.exepid process 2976 2024-05-22_e71d3f228d2d57e3c405b2c778a3efad_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
Processes:
2024-05-22_e71d3f228d2d57e3c405b2c778a3efad_cryptolocker.exegewos.exepid process 2976 2024-05-22_e71d3f228d2d57e3c405b2c778a3efad_cryptolocker.exe 1932 gewos.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
2024-05-22_e71d3f228d2d57e3c405b2c778a3efad_cryptolocker.exedescription pid process target process PID 2976 wrote to memory of 1932 2976 2024-05-22_e71d3f228d2d57e3c405b2c778a3efad_cryptolocker.exe gewos.exe PID 2976 wrote to memory of 1932 2976 2024-05-22_e71d3f228d2d57e3c405b2c778a3efad_cryptolocker.exe gewos.exe PID 2976 wrote to memory of 1932 2976 2024-05-22_e71d3f228d2d57e3c405b2c778a3efad_cryptolocker.exe gewos.exe PID 2976 wrote to memory of 1932 2976 2024-05-22_e71d3f228d2d57e3c405b2c778a3efad_cryptolocker.exe gewos.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_e71d3f228d2d57e3c405b2c778a3efad_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-22_e71d3f228d2d57e3c405b2c778a3efad_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\gewos.exe"C:\Users\Admin\AppData\Local\Temp\gewos.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD511d26def4edb4a709db0e5192c2858ec
SHA1096a04f918872281aac80153e2683173702aae18
SHA25605178359bd9b14d944086effba093a29d78ab88471410c74a565f6c1e3fb9887
SHA51255f249363abc2de2b6f9caf9e240b997e50f82dc90d0690405fd54bf6d44e42a20384cb9d2eb50bd43a87fb540a7e0d896ccb231c41d9b83e40dd05ce3756fdd