Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 02:28
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-09_13c1d900a30697be9686d5e146b6bbfd_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-09_13c1d900a30697be9686d5e146b6bbfd_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-09_13c1d900a30697be9686d5e146b6bbfd_cryptolocker.exe
-
Size
64KB
-
MD5
13c1d900a30697be9686d5e146b6bbfd
-
SHA1
ae5b24e139e7465c39573030e236b1de674a0544
-
SHA256
1386ddbe8b60a6988d6fbed098ff21db9782114b392e5e81552fc2f8178b8deb
-
SHA512
901377e5d84527ee9152804f2488daa45bc6a34e664cdb1db5dcd5e36859b752ad5cd369d0db9b9f426e75e6148f8e51f21bfbdbe21d209a010d0bd080f2f28f
-
SSDEEP
1536:btB9g/xtCSKfxLIc//Xr+/AO/kIZ3ft2nVuTKB6nggOlHdUHZnTc:btng54SMLr+/AO/kIhfoKMHdag
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2620 gewos.exe -
Loads dropped DLL 1 IoCs
pid Process 3000 2024-09-09_13c1d900a30697be9686d5e146b6bbfd_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-09_13c1d900a30697be9686d5e146b6bbfd_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gewos.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3000 2024-09-09_13c1d900a30697be9686d5e146b6bbfd_cryptolocker.exe 2620 gewos.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2620 3000 2024-09-09_13c1d900a30697be9686d5e146b6bbfd_cryptolocker.exe 30 PID 3000 wrote to memory of 2620 3000 2024-09-09_13c1d900a30697be9686d5e146b6bbfd_cryptolocker.exe 30 PID 3000 wrote to memory of 2620 3000 2024-09-09_13c1d900a30697be9686d5e146b6bbfd_cryptolocker.exe 30 PID 3000 wrote to memory of 2620 3000 2024-09-09_13c1d900a30697be9686d5e146b6bbfd_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-09_13c1d900a30697be9686d5e146b6bbfd_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-09_13c1d900a30697be9686d5e146b6bbfd_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\gewos.exe"C:\Users\Admin\AppData\Local\Temp\gewos.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5044cf122fb945359236b46e4ab43113d
SHA14f09b2d69c7efd6b4c6c83e559fdf1c746bd8b23
SHA2563c3cc85204b52073ba1f1d20c64ad1f32a9b36a209dee48274424593efa5a615
SHA512c47add44216a276005df148860af69ff28692f6e245e5c00a41348ee37ec589b9f2f5bd828c50ee963c564e7009b691e56eeaa30ca30b75d70b1a846b2d9139b