Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-02-2024 14:30

General

  • Target

    2024-02-18_4a0d1202ef036b6a3c059f3ae779ae94_cryptolocker.exe

  • Size

    60KB

  • MD5

    4a0d1202ef036b6a3c059f3ae779ae94

  • SHA1

    4b83079fef2dcd992c758e61bb08735d65859fd4

  • SHA256

    848a165009c61782eb585da663a19e42517f35d70397b90625fc6cde3b42d8d8

  • SHA512

    b822eecd4e182c8f913dcd50d77992d6a0cc57f94e0293a597dd10886158fbf52957e1460153ee6ba2bfdbf89dbed6f772fb2b8e9441107ecbe5cff462d0b937

  • SSDEEP

    1536:btB9g/xtCSKfxLIc//Xr+/AO/kIZ3ft2nVuTKB6nggOlHdUH/:btng54SMLr+/AO/kIhfoKMHdq

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-18_4a0d1202ef036b6a3c059f3ae779ae94_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-18_4a0d1202ef036b6a3c059f3ae779ae94_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1816
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:4508

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\gewos.exe

    Filesize

    60KB

    MD5

    60000487f09b9c616a18c4d1e91ddc20

    SHA1

    3ccc7905a692471ddcd6120255180097a17743b9

    SHA256

    3d68d7e3e45be3d150fdf27840a95836121bdd0ee889bb2680f3ea512a75329a

    SHA512

    2be42b1ca84519f76e1e17501bc5638c4cffb33db66fa84ec3fc189e930b6c7178b6007053faff916e8ba20e29d3a74719896bceefa798bf237e73fafbe58561

  • memory/1816-0-0x00000000022D0000-0x00000000022D6000-memory.dmp

    Filesize

    24KB

  • memory/1816-1-0x00000000022D0000-0x00000000022D6000-memory.dmp

    Filesize

    24KB

  • memory/1816-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/4508-21-0x0000000002010000-0x0000000002016000-memory.dmp

    Filesize

    24KB