Analysis

  • max time kernel
    150s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/02/2024, 05:23

General

  • Target

    2024-02-24_e87868dfe877cfcbb8e26de705f2bc5d_cryptolocker.exe

  • Size

    31KB

  • MD5

    e87868dfe877cfcbb8e26de705f2bc5d

  • SHA1

    3511894560dcc5a97ac00725db1e86b7d04994ec

  • SHA256

    7c2530d35242d5821c821e5e6cd22e12172dcc1150fb3febb02de6df5e3ce7ce

  • SHA512

    2d700deeacbbf2616f66ebf089f51e29f66a590142fe8d439bb78e1d2964ee9271fc71a400d322d98dd07d58102f22b0996c51b7eff6604bc71bb3cea99f1022

  • SSDEEP

    384:bmM0V/YPvnr801TRoUGPh4TKt6ATt1DqgPa3s/zzoCt9R0aOr:b7o/2n1TCraU6GD1a4Xt9R0aOr

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-24_e87868dfe877cfcbb8e26de705f2bc5d_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-24_e87868dfe877cfcbb8e26de705f2bc5d_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2672
    • C:\Users\Admin\AppData\Local\Temp\rewok.exe
      "C:\Users\Admin\AppData\Local\Temp\rewok.exe"
      2⤵
      • Executes dropped EXE
      PID:4576

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rewok.exe

          Filesize

          32KB

          MD5

          2fc54468cacfedec47470e8b8d2f4c3c

          SHA1

          9b3c755dfb4063470d723799b2df3f49afb05f10

          SHA256

          bb38d419ee3adc26f11c110935bfc774cda3477a9016a1605f1809e55f528e43

          SHA512

          005aa4f5eb3daa52f875af0cbe927c3025f2d48d2f0bc5c311cff3517748a708dff4f6f7bd4291e754f028a073aedc4852338ecdac700f924772a5fd1423bcad

        • memory/2672-0-0x0000000002250000-0x0000000002256000-memory.dmp

          Filesize

          24KB

        • memory/2672-1-0x0000000002250000-0x0000000002256000-memory.dmp

          Filesize

          24KB

        • memory/2672-2-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/4576-21-0x0000000002020000-0x0000000002026000-memory.dmp

          Filesize

          24KB