Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-02-2024 17:56

General

  • Target

    2024-02-12_f37e4ed142aae67080ed8f58bb12e92f_cryptolocker.exe

  • Size

    41KB

  • MD5

    f37e4ed142aae67080ed8f58bb12e92f

  • SHA1

    9c5a4c6d6e443da23685455d725146026f9e099c

  • SHA256

    1667557ba87132c48f05cbc3a31c3beb18ea762f9a8c80af552814c81a6b8880

  • SHA512

    422e31c6cb091d307b488767402d7b7a71f4166cb4506055ade10ad20dca305d25362711f9a7cfc45d807e9ac0dff0e59f12c7041bdcd7d5a170b6fa4f37c6fb

  • SSDEEP

    768:b7o/2n1TCraU6GD1a4X0WcO+wMVm+slAMRqbo33:bc/y2lkF0+BjUH

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-12_f37e4ed142aae67080ed8f58bb12e92f_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-12_f37e4ed142aae67080ed8f58bb12e92f_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2128
    • C:\Users\Admin\AppData\Local\Temp\rewok.exe
      "C:\Users\Admin\AppData\Local\Temp\rewok.exe"
      2⤵
      • Executes dropped EXE
      PID:2304

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rewok.exe

    Filesize

    42KB

    MD5

    9f5851994335e9735ff7b67aad230781

    SHA1

    8127c2a8befd8e05a1bc5318a48cc139d7a3479d

    SHA256

    6255f3ff11558397685cdb6581ccb0de64bb8414d3a32c4bffe26cff16115a7b

    SHA512

    50d16633f343d3a4c87a4ff90dd173dd9d7f92aa7e92ce0a6bd9ff22e290a5bb8cfd2bd09a18c221caa2044c004cafa592fc87e4eebb3369307d9450cf119061

  • memory/2128-0-0x00000000021D0000-0x00000000021D6000-memory.dmp

    Filesize

    24KB

  • memory/2128-1-0x00000000021D0000-0x00000000021D6000-memory.dmp

    Filesize

    24KB

  • memory/2128-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2304-21-0x0000000000530000-0x0000000000536000-memory.dmp

    Filesize

    24KB