Analysis
-
max time kernel
89s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
13-02-2024 06:19
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-13_f229041444e10f77a0dd3b1860fc163a_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-13_f229041444e10f77a0dd3b1860fc163a_cryptolocker.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-13_f229041444e10f77a0dd3b1860fc163a_cryptolocker.exe
-
Size
35KB
-
MD5
f229041444e10f77a0dd3b1860fc163a
-
SHA1
f0d2a37d97669fffe1aa1e15a58941d0e91c78ae
-
SHA256
ae67b3fdc10706aeb89d7570ed5b2f90def90c8fdde273474789d8da8e7676e3
-
SHA512
53665337f55b04257830d6b1b8c3a2cab8652e432c535431cd07dc73ed45aae3c89c57d65b9d7cd08ca3d7d22621009c50706676bcfc0e7c6691f38b4d1a9b49
-
SSDEEP
384:btBYQg/WIEhUCSNyepEjYnDOAlzVol6U/zzo+tkq4XDIwNiJXxXunKUe:btB9g/WItCSsAGjX7e9N0hunKUe
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x000800000002325a-12.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 2024-02-13_f229041444e10f77a0dd3b1860fc163a_cryptolocker.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation gewos.exe -
Executes dropped EXE 1 IoCs
pid Process 4788 gewos.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1648 wrote to memory of 4788 1648 2024-02-13_f229041444e10f77a0dd3b1860fc163a_cryptolocker.exe 84 PID 1648 wrote to memory of 4788 1648 2024-02-13_f229041444e10f77a0dd3b1860fc163a_cryptolocker.exe 84 PID 1648 wrote to memory of 4788 1648 2024-02-13_f229041444e10f77a0dd3b1860fc163a_cryptolocker.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_f229041444e10f77a0dd3b1860fc163a_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-13_f229041444e10f77a0dd3b1860fc163a_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\gewos.exe"C:\Users\Admin\AppData\Local\Temp\gewos.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:4788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5ec54c2c68d453b5ee7be9467b3201164
SHA1a6fd2045a69256f05e5466712773f48752d05b54
SHA256f695e091fd2726039e9921acc8fc0ee51e9eb3cfe977d499ad84b476dae7f761
SHA512cc96fa396d1384deb189c52d78ed779939579d45007e69d1e0770013ab5b8820d9aaa0bf7c0111a81f8543044cadb535081c3011f083a4d26e8e2be3fecc871f