Analysis
-
max time kernel
0s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10/06/2024, 05:47
Behavioral task
behavioral1
Sample
2024-06-10_6028ef7603bd0837984aff733e5f96f8_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-10_6028ef7603bd0837984aff733e5f96f8_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-10_6028ef7603bd0837984aff733e5f96f8_cryptolocker.exe
-
Size
57KB
-
MD5
6028ef7603bd0837984aff733e5f96f8
-
SHA1
479c86f6ddf85d8b8267cebbfe253a5c24052ece
-
SHA256
6f07e2d804847895b891626ebb404358e1b2d8ce594de164b678167172c53f26
-
SHA512
c4aeaea3a0cd9b3ca3690f94d715de975eb65fba5a078de845d56bffd2020d1c8d117c72d29ced30e2f46450ca9fc661390ba36b47a3dbf7a59297b7d777be2b
-
SSDEEP
768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlj:bP9g/xtCS3Dxx0A
Malware Config
Signatures
-
Detection of CryptoLocker Variants 3 IoCs
resource yara_rule behavioral1/files/0x000c00000001227b-24.dat CryptoLocker_rule2 behavioral1/memory/3020-17-0x0000000000400000-0x000000000040E000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2380-0-0x0000000000400000-0x000000000040E000-memory.dmp CryptoLocker_rule2 -
UPX dump on OEP (original entry point) 3 IoCs
resource yara_rule behavioral1/files/0x000c00000001227b-24.dat UPX behavioral1/memory/3020-17-0x0000000000400000-0x000000000040E000-memory.dmp UPX behavioral1/memory/2380-0-0x0000000000400000-0x000000000040E000-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 3020 gewos.exe -
Loads dropped DLL 1 IoCs
pid Process 2380 2024-06-10_6028ef7603bd0837984aff733e5f96f8_cryptolocker.exe -
resource yara_rule behavioral1/files/0x000c00000001227b-24.dat upx behavioral1/memory/3020-17-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2380-0-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2380 2024-06-10_6028ef7603bd0837984aff733e5f96f8_cryptolocker.exe 3020 gewos.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 3020 2380 2024-06-10_6028ef7603bd0837984aff733e5f96f8_cryptolocker.exe 28 PID 2380 wrote to memory of 3020 2380 2024-06-10_6028ef7603bd0837984aff733e5f96f8_cryptolocker.exe 28 PID 2380 wrote to memory of 3020 2380 2024-06-10_6028ef7603bd0837984aff733e5f96f8_cryptolocker.exe 28 PID 2380 wrote to memory of 3020 2380 2024-06-10_6028ef7603bd0837984aff733e5f96f8_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-10_6028ef7603bd0837984aff733e5f96f8_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-10_6028ef7603bd0837984aff733e5f96f8_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\gewos.exe"C:\Users\Admin\AppData\Local\Temp\gewos.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD5e0ff9e5aead0ea4231b71d9f5e4e636b
SHA1bad74b1fe3d1a8816a8c7ac12806701e1b104022
SHA2564d6edd2ee05ffd9f0d68103e8083dbc69a16b39099a290c38df2386a0f25c66e
SHA512f7fad8c3cfc3676efec992dea0900e1f522fde6b31791d2742a5ee91ddd69b396d1205d6f765542209b9144ef8fca5312de207045f4467c3f35c1b88d647c0d0