Analysis

  • max time kernel
    133s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/01/2024, 22:44

General

  • Target

    2024-01-24_ab3c30ec4dcffadc1ab2218dad911bbf_cryptolocker.exe

  • Size

    35KB

  • MD5

    ab3c30ec4dcffadc1ab2218dad911bbf

  • SHA1

    9f11eadd7a8a6e58c1fffc11a94c23d4f1ca2bd9

  • SHA256

    034fcf3fe01ff286389f826ddbe180b439464dcf4a61ebb57824b962d0b6a39f

  • SHA512

    40f42544624ec52277580e64d2e607259da4690929db8cf5df8f61719c480b59a7aa2568b21c5850e30d1492c40aa11e77dacde3eb77a6fb40bf5e57c747d5c1

  • SSDEEP

    384:btBYQg/WIEhUCSNyepEjYnDOAlzVol6U/zzo+tkq4XDIwNiJXxXun1k:btB9g/WItCSsAGjX7e9N0huni

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-24_ab3c30ec4dcffadc1ab2218dad911bbf_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-24_ab3c30ec4dcffadc1ab2218dad911bbf_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:488
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:1188

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\gewos.exe

    Filesize

    35KB

    MD5

    e40471e1fa1c090208ed9a9fa8155617

    SHA1

    e1237407f9d616d93cf2ac18d6f4653c00e9e69d

    SHA256

    b5f33e6c7d7a88eca003d7b9de0a5153ca4056c24d18bce8ad6cc235d0dcb34a

    SHA512

    01e15c81d5db73dc1316c356b073af1b3a7e4caca0b28caa882fc73bbbc99083f93724f1d912b5755581eee5750400b58272847833a5f7904fe8d2cc8a6cbb0e

  • memory/488-0-0x0000000002250000-0x0000000002256000-memory.dmp

    Filesize

    24KB

  • memory/488-1-0x0000000002250000-0x0000000002256000-memory.dmp

    Filesize

    24KB

  • memory/488-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/1188-20-0x0000000002070000-0x0000000002076000-memory.dmp

    Filesize

    24KB