Analysis
-
max time kernel
132s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 10:28
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-28_19d202c9305dd8c3facb92e7988de4c0_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-28_19d202c9305dd8c3facb92e7988de4c0_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-28_19d202c9305dd8c3facb92e7988de4c0_cryptolocker.exe
-
Size
35KB
-
MD5
19d202c9305dd8c3facb92e7988de4c0
-
SHA1
6304899f42735d67bc5f1a531528795e86859161
-
SHA256
07f4bb5e45abaff1e0a4ee19ce03cb4f733421d73bd116ab014b9924b5d1c023
-
SHA512
fec9e616c098494be0fc3519b81c76b54b02b7a02be9b58991698f85037b6639ff23b2bfe019d28fbd965a9ef9d43fcaa894c999f911e257cd12fecddb92d1eb
-
SSDEEP
384:btBYQg/WIEhUCSNyepEjYnDOAlzVol6U/zzo+tkq4l8tFFxE2BodcAOjbQ36ttTJ:btB9g/WItCSsAGjX7r3BGub8+
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2968 gewos.exe -
Loads dropped DLL 1 IoCs
pid Process 3020 2024-09-28_19d202c9305dd8c3facb92e7988de4c0_cryptolocker.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gewos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-28_19d202c9305dd8c3facb92e7988de4c0_cryptolocker.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3020 2024-09-28_19d202c9305dd8c3facb92e7988de4c0_cryptolocker.exe 2968 gewos.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2968 3020 2024-09-28_19d202c9305dd8c3facb92e7988de4c0_cryptolocker.exe 30 PID 3020 wrote to memory of 2968 3020 2024-09-28_19d202c9305dd8c3facb92e7988de4c0_cryptolocker.exe 30 PID 3020 wrote to memory of 2968 3020 2024-09-28_19d202c9305dd8c3facb92e7988de4c0_cryptolocker.exe 30 PID 3020 wrote to memory of 2968 3020 2024-09-28_19d202c9305dd8c3facb92e7988de4c0_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-28_19d202c9305dd8c3facb92e7988de4c0_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-28_19d202c9305dd8c3facb92e7988de4c0_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\gewos.exe"C:\Users\Admin\AppData\Local\Temp\gewos.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD59c3938e95e8be5f2afbeb04edb8fbf8e
SHA196f5fa17de63a56ae8a669173980bd0d4715b657
SHA256d0772612fbfc7d75d82ffd7b8bf466ca70950fa1e648eaa6cb6afc6da5d420a2
SHA51213e9b3e146e0d66db25b1116712da5f0134123fa2cad941fa1b20107df04381b47c414535c8a0bfbb79c4caf6fd4157d89b66bf794e19fd647c933a4cd576d0f