Analysis

  • max time kernel
    93s
  • max time network
    114s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-02-2024 03:44

General

  • Target

    2024-02-29_3693937de6d6280132d6c19d1d23a218_cryptolocker.exe

  • Size

    34KB

  • MD5

    3693937de6d6280132d6c19d1d23a218

  • SHA1

    1b6ed901bf904b79c3932d57651df033f525c78d

  • SHA256

    62b9f4c1412db1b2c729ba1e31e1bcbb3d68bfb87a53f1c89b09b0bd9ad3ecbc

  • SHA512

    7ecaff1e3dc4a15fb573591d36b328b1de07bc839a88580d53a3bebe3095aa266cf32a82172213d089f92a79c1c8da5523000a98ffd7f9d440f6b2239cec85aa

  • SSDEEP

    384:btBYQg/WIEhUCSNyepEjYnDOAlzVol6U/zzo+tkq4l8tFFxE2B0qp:btB9g/WItCSsAGjX7r3BTp

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-29_3693937de6d6280132d6c19d1d23a218_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-29_3693937de6d6280132d6c19d1d23a218_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4344
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:3208

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\gewos.exe

    Filesize

    34KB

    MD5

    46568c3c6cb8c77ced0fff5986953175

    SHA1

    babd1ba3b680b017438d29600a9790b807931f94

    SHA256

    28272891148191167d709908d8c5db0317a58f5a2d491c504331a29d27760636

    SHA512

    6112e4398e7a7b2c76c063f723b096bf846feb00cd42588131747eeb985303cd97cb089ceca7fdfea81c54d13b03ea07b1fbed57878a603fc0f19e674cc29ccb

  • memory/3208-19-0x00000000020A0000-0x00000000020A6000-memory.dmp

    Filesize

    24KB

  • memory/4344-0-0x0000000002350000-0x0000000002356000-memory.dmp

    Filesize

    24KB

  • memory/4344-1-0x0000000002350000-0x0000000002356000-memory.dmp

    Filesize

    24KB

  • memory/4344-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB