Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 18:47
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-29_0766bdeec3b7cba3a08c78b23c1f8351_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-29_0766bdeec3b7cba3a08c78b23c1f8351_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-29_0766bdeec3b7cba3a08c78b23c1f8351_cryptolocker.exe
-
Size
45KB
-
MD5
0766bdeec3b7cba3a08c78b23c1f8351
-
SHA1
377995d33c996381c110aa35b3b7034584ca9dcc
-
SHA256
12d21547885b85142b25f05a0a63f1c415a3f1cb120fb711fac05243911f10e2
-
SHA512
84ba433798c9283a193c09aae8e058b2263d3ddc24413fd50739cea10cd8dab2ad712cac08d935f56964e69a272b338f3e1ac50ee93ac747dab2594c57868445
-
SSDEEP
384:btBYQg/WIEhUCSNyepEjYnDOAlzVol6U/zzo+tkq4XDIwNiJXxXunrkwIxZWQpyL:btB9g/WItCSsAGjX7e9N0hunrknljKrr
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000e000000014698-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2560 gewos.exe -
Loads dropped DLL 1 IoCs
pid Process 2656 2024-05-29_0766bdeec3b7cba3a08c78b23c1f8351_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2656 2024-05-29_0766bdeec3b7cba3a08c78b23c1f8351_cryptolocker.exe 2560 gewos.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2560 2656 2024-05-29_0766bdeec3b7cba3a08c78b23c1f8351_cryptolocker.exe 28 PID 2656 wrote to memory of 2560 2656 2024-05-29_0766bdeec3b7cba3a08c78b23c1f8351_cryptolocker.exe 28 PID 2656 wrote to memory of 2560 2656 2024-05-29_0766bdeec3b7cba3a08c78b23c1f8351_cryptolocker.exe 28 PID 2656 wrote to memory of 2560 2656 2024-05-29_0766bdeec3b7cba3a08c78b23c1f8351_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-29_0766bdeec3b7cba3a08c78b23c1f8351_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-29_0766bdeec3b7cba3a08c78b23c1f8351_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\gewos.exe"C:\Users\Admin\AppData\Local\Temp\gewos.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD537c0b913be52f4be52581bac87d3c6fc
SHA1640237ec9086b22568486a4157f12f6db45db346
SHA2566424c6e72db00d9118a62cfd4393969f84e090ef6ae986691d74069599367928
SHA512976f0125d0fde4cfdc47813332286e1bec610f4ab06ce10059b4964f54e14fcb9ce807830eeffd36af81f153cd8fde3d5c0bc4f57269999a6af9e74d2064e440