Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 05:29
Behavioral task
behavioral1
Sample
2024-10-18_83aa687dbd3cb71753c0ff469d249b6c_cryptolocker.exe
Resource
win7-20240708-en
General
-
Target
2024-10-18_83aa687dbd3cb71753c0ff469d249b6c_cryptolocker.exe
-
Size
58KB
-
MD5
83aa687dbd3cb71753c0ff469d249b6c
-
SHA1
a547b4794fa4cf5188102ba6716245e473936c27
-
SHA256
df8a4aab585fc328f730b74b8c968f43ea3dabbd7438a4f3125d735a9b3d0006
-
SHA512
63c4a08a916a825601b6c976e3f4bd5fd0f297d1c8c7fe697ad4c9ef0fda59491cee6d4d0a628f39245a72ee60a7a77462e8323c0e2e34516de7e661f9a3f001
-
SSDEEP
768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlYY:bP9g/xtCS3Dxx0LY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1276 gewos.exe -
Loads dropped DLL 1 IoCs
pid Process 2320 2024-10-18_83aa687dbd3cb71753c0ff469d249b6c_cryptolocker.exe -
resource yara_rule behavioral1/memory/2320-0-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/files/0x000a00000001202b-11.dat upx behavioral1/memory/1276-16-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/1276-26-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-18_83aa687dbd3cb71753c0ff469d249b6c_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gewos.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2320 2024-10-18_83aa687dbd3cb71753c0ff469d249b6c_cryptolocker.exe 1276 gewos.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2320 wrote to memory of 1276 2320 2024-10-18_83aa687dbd3cb71753c0ff469d249b6c_cryptolocker.exe 29 PID 2320 wrote to memory of 1276 2320 2024-10-18_83aa687dbd3cb71753c0ff469d249b6c_cryptolocker.exe 29 PID 2320 wrote to memory of 1276 2320 2024-10-18_83aa687dbd3cb71753c0ff469d249b6c_cryptolocker.exe 29 PID 2320 wrote to memory of 1276 2320 2024-10-18_83aa687dbd3cb71753c0ff469d249b6c_cryptolocker.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-18_83aa687dbd3cb71753c0ff469d249b6c_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-18_83aa687dbd3cb71753c0ff469d249b6c_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\gewos.exe"C:\Users\Admin\AppData\Local\Temp\gewos.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:1276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD587d775e4eb1b7fd3224da89c17fc3e8f
SHA15ecf1fd645ce3d125dbe77d5fc1d0a9e46a48b33
SHA2560987c7f7c4d48d585d1f31a6055425e42f70ed8e1eeb4d0841813aa37d718191
SHA512a00a74353acf48a11fcec0a0f3a7d600510e98fb62eb23cd3f65a88c05ace91dcca56a28724547beac8b96255fed03ed5821b988f619c37bfb39e466dc28dfb6