Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 00:26
Behavioral task
behavioral1
Sample
2024-09-09_a62919fe645b2bb66df0cdd80f77eb2e_cryptolocker.exe
Resource
win7-20240729-en
General
-
Target
2024-09-09_a62919fe645b2bb66df0cdd80f77eb2e_cryptolocker.exe
-
Size
59KB
-
MD5
a62919fe645b2bb66df0cdd80f77eb2e
-
SHA1
0b1c8114601c02ec0087c2a9a85989c80bed3ae5
-
SHA256
4494446e639b8310cf5487c7bc0b386fea66630aa83203bb07f0b925144c02cb
-
SHA512
2126b6b8088e989142e484a3af9384b56f21ad450fe6bec74d2059230f04daffc64f45b6a3d9ec94979fc7a8ce37cc80375b4e4f9b1d030f208b541c5dde850d
-
SSDEEP
768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlgcS2:bP9g/xtCS3Dxx0y
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2764 gewos.exe -
Loads dropped DLL 1 IoCs
pid Process 2328 2024-09-09_a62919fe645b2bb66df0cdd80f77eb2e_cryptolocker.exe -
resource yara_rule behavioral1/memory/2328-0-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/files/0x00080000000120fd-11.dat upx behavioral1/memory/2764-16-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gewos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-09_a62919fe645b2bb66df0cdd80f77eb2e_cryptolocker.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2328 2024-09-09_a62919fe645b2bb66df0cdd80f77eb2e_cryptolocker.exe 2764 gewos.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2764 2328 2024-09-09_a62919fe645b2bb66df0cdd80f77eb2e_cryptolocker.exe 30 PID 2328 wrote to memory of 2764 2328 2024-09-09_a62919fe645b2bb66df0cdd80f77eb2e_cryptolocker.exe 30 PID 2328 wrote to memory of 2764 2328 2024-09-09_a62919fe645b2bb66df0cdd80f77eb2e_cryptolocker.exe 30 PID 2328 wrote to memory of 2764 2328 2024-09-09_a62919fe645b2bb66df0cdd80f77eb2e_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-09_a62919fe645b2bb66df0cdd80f77eb2e_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-09_a62919fe645b2bb66df0cdd80f77eb2e_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\gewos.exe"C:\Users\Admin\AppData\Local\Temp\gewos.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD5259736449d36ae7fe113d7c3534e0075
SHA19ec67bdfcc702563fe11cfd486139c0f80c305da
SHA25698785cc8b70ff9be541954ce50a5c7987ba37799940ef7be553b5c5336274450
SHA512724b203f7e4fb00b49ae8a668b2f2a2f7983719d9ce5336584a266948d33a3c0033682070f9909a987a1d101882f9d9c8517f679ac95fb6028f668a2ace2c147