Analysis
-
max time kernel
88s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29/01/2024, 03:30
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-29_5c258dc1bad1f8f6976c6ca2ea87a30a_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-29_5c258dc1bad1f8f6976c6ca2ea87a30a_cryptolocker.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-29_5c258dc1bad1f8f6976c6ca2ea87a30a_cryptolocker.exe
-
Size
49KB
-
MD5
5c258dc1bad1f8f6976c6ca2ea87a30a
-
SHA1
ca50266db779f1b3b5763c9b12ce9a29ff1a527f
-
SHA256
2fa89d9ff8ada0743e2c708b281ad231da19263fecca9225a9fc0ad0dc2f4ed5
-
SHA512
f355e5a5179505d3b9055a255d2fe385f6b0375dd30e076ef5289285df629e145115f53b31f844ffd1f3f9846ee224eafca6672b4f103ea6def0389dd35c4533
-
SSDEEP
768:btB9g/WItCSsAGjX7r3BPOMHoc/QQJP5wjvaHYwiq6:btB9g/xtCSKfxLIc/E1a6
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023210-12.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 2024-01-29_5c258dc1bad1f8f6976c6ca2ea87a30a_cryptolocker.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation gewos.exe -
Executes dropped EXE 1 IoCs
pid Process 3968 gewos.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 396 wrote to memory of 3968 396 2024-01-29_5c258dc1bad1f8f6976c6ca2ea87a30a_cryptolocker.exe 86 PID 396 wrote to memory of 3968 396 2024-01-29_5c258dc1bad1f8f6976c6ca2ea87a30a_cryptolocker.exe 86 PID 396 wrote to memory of 3968 396 2024-01-29_5c258dc1bad1f8f6976c6ca2ea87a30a_cryptolocker.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-29_5c258dc1bad1f8f6976c6ca2ea87a30a_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-29_5c258dc1bad1f8f6976c6ca2ea87a30a_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Users\Admin\AppData\Local\Temp\gewos.exe"C:\Users\Admin\AppData\Local\Temp\gewos.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:3968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD51b891572176e54fe89870db0910aabd7
SHA15f46018ade1c2d055275fcd6c1f9faae89d878c7
SHA2569ce81f42a49d170c3208f78f6aea3956341309da49a6de4839870a1ccf45e13a
SHA512139a4b557580640ba7e9332c4fb85fe4093ee7b42e9cd474fd8cd03453c8d020c74db9a7e1f5d0be80baae101d650d0f4498f9fb42ffa64cb8d28e4d8307c840