Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/02/2024, 16:26

General

  • Target

    2024-02-14_12afc1e812ad5dc1cdc57646fe706e16_cryptolocker.exe

  • Size

    33KB

  • MD5

    12afc1e812ad5dc1cdc57646fe706e16

  • SHA1

    61b4ad780cc21f072bd64643906a6ebf05502e83

  • SHA256

    4bdb0ae166d7832ba0a3285cace74c91bb27776dd9e8a1e5c27a9f7fc32839cc

  • SHA512

    e9aa7412ddeec52ce21b26711a7b3f108fe2bdb2128ab9ce964c390eaa211aae4f77877c9a50ab5bb5d1f4e97d9bd1a76eddca3c63bb3dfec22dc0472e68d7ec

  • SSDEEP

    384:bmM0V/YPvnr801TRoUGPh4TKt6ATt1DqgPa3s/zzoCt9/B1RwFtzxt1i:b7o/2n1TCraU6GD1a4Xt9bRwrbk

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-14_12afc1e812ad5dc1cdc57646fe706e16_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-14_12afc1e812ad5dc1cdc57646fe706e16_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:396
    • C:\Users\Admin\AppData\Local\Temp\rewok.exe
      "C:\Users\Admin\AppData\Local\Temp\rewok.exe"
      2⤵
      • Executes dropped EXE
      PID:4960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rewok.exe

    Filesize

    33KB

    MD5

    47a9d4d09f58bb21ff2c094022302276

    SHA1

    f567717b39bc8f27cd90673a61d0372f1a2b4797

    SHA256

    5dad27a010eb05b9990a2712a5347d0357617007a594327fb6b8a6ce8a327708

    SHA512

    e97f48a3ee8c0ae06b1f7dff0af3e52e26730e9375059a31f2c98de389693109633e9de540f94c07d538b5a206452758a823646e684b9890858dc9a859308ca8

  • memory/396-0-0x0000000002350000-0x0000000002356000-memory.dmp

    Filesize

    24KB

  • memory/396-1-0x0000000002350000-0x0000000002356000-memory.dmp

    Filesize

    24KB

  • memory/396-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/4960-20-0x0000000001FE0000-0x0000000001FE6000-memory.dmp

    Filesize

    24KB