Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
12-06-2024 01:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-12_7daaa02800ae574b74403b510d34beac_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-12_7daaa02800ae574b74403b510d34beac_cryptolocker.exe
Resource
win10v2004-20240611-en
General
-
Target
2024-06-12_7daaa02800ae574b74403b510d34beac_cryptolocker.exe
-
Size
62KB
-
MD5
7daaa02800ae574b74403b510d34beac
-
SHA1
87d4f671bfd85cd9ad696edf0d42a8a33bba73a3
-
SHA256
fe15dcba459d00ce5a731c93c80b42b2d7cd41287998b421bddd8236a14de46a
-
SHA512
e53bd21ffe1ff40f8bd0b80bdf1ba4d127505936a985092f2e48e539f12523075f0c4634e6916fa32871e816047d43b41c2f206e60c5448b08dc340ec178e807
-
SSDEEP
1536:btB9g/xtCSKfxLIc//Xr+/AO/kIZ3ft2nVuTKB6nggOlHdUHZnx2:btng54SMLr+/AO/kIhfoKMHda8
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000b00000001226d-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2424 gewos.exe -
Loads dropped DLL 1 IoCs
pid Process 2104 2024-06-12_7daaa02800ae574b74403b510d34beac_cryptolocker.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2104 2024-06-12_7daaa02800ae574b74403b510d34beac_cryptolocker.exe 2424 gewos.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2424 2104 2024-06-12_7daaa02800ae574b74403b510d34beac_cryptolocker.exe 28 PID 2104 wrote to memory of 2424 2104 2024-06-12_7daaa02800ae574b74403b510d34beac_cryptolocker.exe 28 PID 2104 wrote to memory of 2424 2104 2024-06-12_7daaa02800ae574b74403b510d34beac_cryptolocker.exe 28 PID 2104 wrote to memory of 2424 2104 2024-06-12_7daaa02800ae574b74403b510d34beac_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-12_7daaa02800ae574b74403b510d34beac_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-12_7daaa02800ae574b74403b510d34beac_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\gewos.exe"C:\Users\Admin\AppData\Local\Temp\gewos.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2424
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD5708f0ad53894c1f8baa66675d482752b
SHA1a5a224f187106a1aa0646b11eff90945e3545e68
SHA256f2d086414d63f55105612f105e546f4252968d4abdf352590fa6fef6151b9a7b
SHA5129de16461aa5adf986c6aeb832aacc722e94957c2a32efd5b1c5776cb6d1919542aed8e4ceaed2a51ebe2d1cb2ee30aad810a9185ca3b5f624e340e111caa4525