Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 02:30
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-23_585ac44aeff6f32486739fe3a57bd067_cryptolocker.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-05-23_585ac44aeff6f32486739fe3a57bd067_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-23_585ac44aeff6f32486739fe3a57bd067_cryptolocker.exe
-
Size
36KB
-
MD5
585ac44aeff6f32486739fe3a57bd067
-
SHA1
0d3397fddf2803f3ab35f1469e1c0271c6c9b906
-
SHA256
2b899a12cbd95a19c545d4a48dc60402c1d257065f796567a37b3be1de934db3
-
SHA512
50775a49f990dcf3974aebdb15bd319f454525a7a9a652ccea72c46cf56738608aea3ba53242152c26ede690142d52b5d529bb69889d008b1c238de5227150f8
-
SSDEEP
384:btBYQg/WIEhUCSNyepEjYnDOAlzVol6U/zzo+tkq4l8tFFxE2B0qvoLUZ61V/:btB9g/WItCSsAGjX7r3BTmUQ1V/
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\gewos.exe CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
Processes:
gewos.exepid process 3028 gewos.exe -
Loads dropped DLL 1 IoCs
Processes:
2024-05-23_585ac44aeff6f32486739fe3a57bd067_cryptolocker.exepid process 1968 2024-05-23_585ac44aeff6f32486739fe3a57bd067_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
Processes:
2024-05-23_585ac44aeff6f32486739fe3a57bd067_cryptolocker.exegewos.exepid process 1968 2024-05-23_585ac44aeff6f32486739fe3a57bd067_cryptolocker.exe 3028 gewos.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
2024-05-23_585ac44aeff6f32486739fe3a57bd067_cryptolocker.exedescription pid process target process PID 1968 wrote to memory of 3028 1968 2024-05-23_585ac44aeff6f32486739fe3a57bd067_cryptolocker.exe gewos.exe PID 1968 wrote to memory of 3028 1968 2024-05-23_585ac44aeff6f32486739fe3a57bd067_cryptolocker.exe gewos.exe PID 1968 wrote to memory of 3028 1968 2024-05-23_585ac44aeff6f32486739fe3a57bd067_cryptolocker.exe gewos.exe PID 1968 wrote to memory of 3028 1968 2024-05-23_585ac44aeff6f32486739fe3a57bd067_cryptolocker.exe gewos.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_585ac44aeff6f32486739fe3a57bd067_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-23_585ac44aeff6f32486739fe3a57bd067_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\gewos.exe"C:\Users\Admin\AppData\Local\Temp\gewos.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD549249c263d411ff41ecc5498423c6dd7
SHA185251c811aeb1caac0b9498163f697b7129d6e4d
SHA256d8b5c3d80dd029a49e6c03d3d835d15fd26cb0518f3652e1e26900708f344451
SHA512c78726ed776062ce84ae776f6d9cd589c5763812b5e14e73906ae53516307273a75a6973fc6d70aa018bf14799039696abf7f18c28c3e27cafc4628cfc421ebc