Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
23-02-2024 19:39
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-23_501e7e7777ecf9f6cd622d5dbde027bd_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-02-23_501e7e7777ecf9f6cd622d5dbde027bd_cryptolocker.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-23_501e7e7777ecf9f6cd622d5dbde027bd_cryptolocker.exe
-
Size
36KB
-
MD5
501e7e7777ecf9f6cd622d5dbde027bd
-
SHA1
a7a0086c4a572604617f8612c08691cd351d9116
-
SHA256
5f8705c195554fda0d26cf33e1a382eb1c82231c935006ca87f120d959ac0059
-
SHA512
7cfdc67ef40171f3c7dda106966d00a91aab3eb88b750d1271d88f657aba2686310ae8fbce799e861674d39d13d93310d3f2b721c83e5c249fcb09f5b056e54b
-
SSDEEP
384:btBYQg/WIEhUCSNyepEjYnDOAlzVol6U/zzo+tkq4XDIwNiJXxXunKUj:btB9g/WItCSsAGjX7e9N0hunKUj
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x000600000002312e-13.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000\Control Panel\International\Geo\Nation 2024-02-23_501e7e7777ecf9f6cd622d5dbde027bd_cryptolocker.exe Key value queried \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000\Control Panel\International\Geo\Nation gewos.exe -
Executes dropped EXE 1 IoCs
pid Process 332 gewos.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 412 wrote to memory of 332 412 2024-02-23_501e7e7777ecf9f6cd622d5dbde027bd_cryptolocker.exe 86 PID 412 wrote to memory of 332 412 2024-02-23_501e7e7777ecf9f6cd622d5dbde027bd_cryptolocker.exe 86 PID 412 wrote to memory of 332 412 2024-02-23_501e7e7777ecf9f6cd622d5dbde027bd_cryptolocker.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-23_501e7e7777ecf9f6cd622d5dbde027bd_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-23_501e7e7777ecf9f6cd622d5dbde027bd_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Users\Admin\AppData\Local\Temp\gewos.exe"C:\Users\Admin\AppData\Local\Temp\gewos.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5223f0c719e98b9452992ae681318120d
SHA11db44c28ef076bc2206218bd15c1934313b95fb3
SHA2561412105d29f73603cea0738aa35e1121bbc2aeca2035b48b724a10c0dc350be6
SHA51212fa2a2978cefbadebbd4afe08ceafdbe9a866d40f7d5593f579bd6fab487c26aa5940597aa9b4ecab66551bb26467bdb910d3e6c763a20ca23722d8a454629b