Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/02/2024, 07:46

General

  • Target

    2024-02-25_f781ca23a91095d688d5ef2e3fe78777_cryptolocker.exe

  • Size

    32KB

  • MD5

    f781ca23a91095d688d5ef2e3fe78777

  • SHA1

    867a02d7ee84770d1072fbca74f0d9fbb3a29224

  • SHA256

    f55c317c93d2c1d06820cd9c0196b150afa9ada200d4dee42f03b7704dbb9368

  • SHA512

    bf4e99f283d73df5b1b7c79226159c82aae6d4b910cde02bc746e7737b564fb14e1bcd51df40b16a0ba278524adc0db14a55cff7259db05c78e6e1417d8389d7

  • SSDEEP

    384:bmM0V/YPvnr801TRoUGPh4TKt6ATt1DqgPa3s/zzoCt9/B+1Pj:b7o/2n1TCraU6GD1a4Xt9G

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-25_f781ca23a91095d688d5ef2e3fe78777_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-25_f781ca23a91095d688d5ef2e3fe78777_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4120
    • C:\Users\Admin\AppData\Local\Temp\rewok.exe
      "C:\Users\Admin\AppData\Local\Temp\rewok.exe"
      2⤵
      • Executes dropped EXE
      PID:2224

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rewok.exe

    Filesize

    33KB

    MD5

    59f9e9b8b52801b1c432d692a9ba6a8e

    SHA1

    49c4ac989284decc6600337f17072fd5945e050c

    SHA256

    e4d5ffa9f299536ccc2c78f7ecb14148e79976065bc95272b04ff9dcfcd8f2d6

    SHA512

    89b3b1e2e590295e4f8c8f86933951000a51c635d2c02587ea2b3732a3103c667af4a2c2e20582d3ea87c8f3f246edb4fff7af574df4acf861ef1eccbded846a

  • memory/2224-21-0x00000000006E0000-0x00000000006E6000-memory.dmp

    Filesize

    24KB

  • memory/4120-0-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/4120-1-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/4120-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB