Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20/02/2024, 08:03
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-20_6cb04e6e268da64f8500c0144b9ea164_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-02-20_6cb04e6e268da64f8500c0144b9ea164_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-20_6cb04e6e268da64f8500c0144b9ea164_cryptolocker.exe
-
Size
44KB
-
MD5
6cb04e6e268da64f8500c0144b9ea164
-
SHA1
26a39df35cf86bae264e282b8c58d2a5cfd717c6
-
SHA256
5a27ef1b7387af087a7d66adc012ca649706fa858ff6aec2fed962d1fe39ffff
-
SHA512
eae3282eb8f3f8158869a4b71d15c2583be17668ad62a3c7606dcf7329d87ec05e123ee93fe460d839096208124656077e881aa043834ec4dcdb1ac541aed5cb
-
SSDEEP
768:b7o/2n1TCraU6GD1a4X0WcO+wMVm+slAMphedg:bc/y2lkF0+Bef
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x000d000000023175-12.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 2024-02-20_6cb04e6e268da64f8500c0144b9ea164_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 4924 rewok.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4776 wrote to memory of 4924 4776 2024-02-20_6cb04e6e268da64f8500c0144b9ea164_cryptolocker.exe 85 PID 4776 wrote to memory of 4924 4776 2024-02-20_6cb04e6e268da64f8500c0144b9ea164_cryptolocker.exe 85 PID 4776 wrote to memory of 4924 4776 2024-02-20_6cb04e6e268da64f8500c0144b9ea164_cryptolocker.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-20_6cb04e6e268da64f8500c0144b9ea164_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-20_6cb04e6e268da64f8500c0144b9ea164_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\rewok.exe"C:\Users\Admin\AppData\Local\Temp\rewok.exe"2⤵
- Executes dropped EXE
PID:4924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD57f5f0f8a2a97acb5e44c5d8db5f234e1
SHA1bc2da27f0e54cf79fcb112771c768d27aef5cd27
SHA256c32e3152f6cf462bfa75c50809353365532815a53fc9732356599401dcb1a528
SHA5123019048d02143bc4f59c0dd0e9913658e2c4778faefede73a18c8aee0a85e16f5502d18b7ece85fdf24d2d9ad4b9f5e6c16cc058899cb03bb2807ab5c8d5f427