Analysis

  • max time kernel
    103s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-02-2024 19:25

General

  • Target

    2024-02-12_9b5d13c1008e877c4e947038e3408fb0_cryptolocker.exe

  • Size

    44KB

  • MD5

    9b5d13c1008e877c4e947038e3408fb0

  • SHA1

    d3c2d35c333d3aa6f218d5675dd9366760afc3c5

  • SHA256

    84f413e1b9549de2cac86f6d6a511df383f80ef1541cfce0a23b2fad4c69e735

  • SHA512

    7e46983fca0fd5459dabe97c2f04dcef629bf2177e752c7ed68207811f041d545495ca4d58911a9c441250f487182b1f309e143cb58ba49024b55c7d1ae0dc14

  • SSDEEP

    768:btB9g/WItCSsAGjX7r3BPOMHocM4vUUOmJ+96egDL:btB9g/xtCSKfxLIcMzUw96nL

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-12_9b5d13c1008e877c4e947038e3408fb0_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-12_9b5d13c1008e877c4e947038e3408fb0_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4116
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:4888

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\gewos.exe

    Filesize

    44KB

    MD5

    3f0adcda472b71f2cfd6a17313221fa6

    SHA1

    6a08e1aaaacb190209d556040592319c93bb0c91

    SHA256

    bb58eaa6bebc30f91cecdc1210a9e7ad8d1ec661c6b2c594cb9630133bc037a3

    SHA512

    60a3fbe59b819c1a618ae61b9537da73a66735178e795eb8407e0f1d9b4e5302379f3fe22f9fde034b55623d19e6cd2138c3072f81d64e4041dbddbb5b3ba16e

  • memory/4116-0-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/4116-1-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/4116-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/4888-21-0x0000000002020000-0x0000000002026000-memory.dmp

    Filesize

    24KB