Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2024 17:36
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-27_c81bc7c5cc88ac434bb39b91729dc503_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-27_c81bc7c5cc88ac434bb39b91729dc503_cryptolocker.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-27_c81bc7c5cc88ac434bb39b91729dc503_cryptolocker.exe
-
Size
41KB
-
MD5
c81bc7c5cc88ac434bb39b91729dc503
-
SHA1
134d1544688a0a2a22ce37d6727989800cd7ef3e
-
SHA256
d139ba078f15c69c93814667c6c105ff1c6c76620b30626f10cd4f2ffca04ff1
-
SHA512
b0084ba07298eb4eefa4aab36ca96fca5ed55fc14040441e066971aedbdf9b3fdff9a5ba25d9535ff6fcd9e15229ae846bd31730b15ba8eebf465b6519e9c3a7
-
SSDEEP
768:b7o/2n1TCraU6GD1a4X0WcO+wMVm+slAMRqRQ:bc/y2lkF0+BjS
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x00080000000231f9-12.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 2024-01-27_c81bc7c5cc88ac434bb39b91729dc503_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 1772 rewok.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2960 wrote to memory of 1772 2960 2024-01-27_c81bc7c5cc88ac434bb39b91729dc503_cryptolocker.exe 84 PID 2960 wrote to memory of 1772 2960 2024-01-27_c81bc7c5cc88ac434bb39b91729dc503_cryptolocker.exe 84 PID 2960 wrote to memory of 1772 2960 2024-01-27_c81bc7c5cc88ac434bb39b91729dc503_cryptolocker.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-27_c81bc7c5cc88ac434bb39b91729dc503_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-27_c81bc7c5cc88ac434bb39b91729dc503_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\rewok.exe"C:\Users\Admin\AppData\Local\Temp\rewok.exe"2⤵
- Executes dropped EXE
PID:1772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5a65b7acaa4c36f6ff275ddbca4e94192
SHA18a8a96fd05d4a31a29e0ac100242a6ecb05c2d9a
SHA256efbc023a9ba65c05072c44a900b1997b3b6d75676565c557bee5fc6a78195cbf
SHA512559b906d180bc6cec71b502ad9d212db35182d841ee26c2f13df404003eeb389b749760fbbff6e246521183d2e94fee79fce5a310e70c40e0e0009c8a9b1a11a