Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/02/2024, 11:23

General

  • Target

    2024-02-20_108178046816aec24c4a44cef51a1b59_cryptolocker.exe

  • Size

    31KB

  • MD5

    108178046816aec24c4a44cef51a1b59

  • SHA1

    51687e7fb87917faad1e5491886c5aaa52c277ad

  • SHA256

    21d5c7b133312b75038eabf2a30b31042703aece20901eb9982b1240448a4a4c

  • SHA512

    2f80bd1acc4a9bc48d7d4408966e254529b1569a9aa52d8c5a497d97d21d75a2851fe1f2518ecdb817cbc0a47f65c05da9c640886389ba2106b1bdefbcf3a043

  • SSDEEP

    384:bmM0V/YPvnr801TRoUGPh4TKt6ATt1DqgPa3s/zzoCt9RDE1X:b7o/2n1TCraU6GD1a4Xt9RQ

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-20_108178046816aec24c4a44cef51a1b59_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-20_108178046816aec24c4a44cef51a1b59_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2492
    • C:\Users\Admin\AppData\Local\Temp\rewok.exe
      "C:\Users\Admin\AppData\Local\Temp\rewok.exe"
      2⤵
      • Executes dropped EXE
      PID:2348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rewok.exe

    Filesize

    31KB

    MD5

    332aa26055a2a8897699a1d0d893235b

    SHA1

    cfd747f3f84dcdf9d43faad7721e526b7cbe8a1b

    SHA256

    f8dd440c2cef6e806e83f679fb22b2301fa055dddf6c27575a586416e42135e3

    SHA512

    c3b8fb8d4ce910add7291e16578264dc411c4d5453e6fc5947ac86d2cc42259892fc53cbb5f6f0e4ee1579615de494be2a553f7dda85afee5f6907a59769e1f0

  • memory/2348-21-0x0000000002210000-0x0000000002216000-memory.dmp

    Filesize

    24KB

  • memory/2492-0-0x0000000000640000-0x0000000000646000-memory.dmp

    Filesize

    24KB

  • memory/2492-1-0x0000000000640000-0x0000000000646000-memory.dmp

    Filesize

    24KB

  • memory/2492-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB