Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 16:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-14_12afc1e812ad5dc1cdc57646fe706e16_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-14_12afc1e812ad5dc1cdc57646fe706e16_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-14_12afc1e812ad5dc1cdc57646fe706e16_cryptolocker.exe
-
Size
33KB
-
MD5
12afc1e812ad5dc1cdc57646fe706e16
-
SHA1
61b4ad780cc21f072bd64643906a6ebf05502e83
-
SHA256
4bdb0ae166d7832ba0a3285cace74c91bb27776dd9e8a1e5c27a9f7fc32839cc
-
SHA512
e9aa7412ddeec52ce21b26711a7b3f108fe2bdb2128ab9ce964c390eaa211aae4f77877c9a50ab5bb5d1f4e97d9bd1a76eddca3c63bb3dfec22dc0472e68d7ec
-
SSDEEP
384:bmM0V/YPvnr801TRoUGPh4TKt6ATt1DqgPa3s/zzoCt9/B1RwFtzxt1i:b7o/2n1TCraU6GD1a4Xt9bRwrbk
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023145-12.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 2024-02-14_12afc1e812ad5dc1cdc57646fe706e16_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 4960 rewok.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 396 wrote to memory of 4960 396 2024-02-14_12afc1e812ad5dc1cdc57646fe706e16_cryptolocker.exe 84 PID 396 wrote to memory of 4960 396 2024-02-14_12afc1e812ad5dc1cdc57646fe706e16_cryptolocker.exe 84 PID 396 wrote to memory of 4960 396 2024-02-14_12afc1e812ad5dc1cdc57646fe706e16_cryptolocker.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-14_12afc1e812ad5dc1cdc57646fe706e16_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-14_12afc1e812ad5dc1cdc57646fe706e16_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Users\Admin\AppData\Local\Temp\rewok.exe"C:\Users\Admin\AppData\Local\Temp\rewok.exe"2⤵
- Executes dropped EXE
PID:4960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD547a9d4d09f58bb21ff2c094022302276
SHA1f567717b39bc8f27cd90673a61d0372f1a2b4797
SHA2565dad27a010eb05b9990a2712a5347d0357617007a594327fb6b8a6ce8a327708
SHA512e97f48a3ee8c0ae06b1f7dff0af3e52e26730e9375059a31f2c98de389693109633e9de540f94c07d538b5a206452758a823646e684b9890858dc9a859308ca8