Analysis
-
max time kernel
93s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29-02-2024 03:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-29_3693937de6d6280132d6c19d1d23a218_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-29_3693937de6d6280132d6c19d1d23a218_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-02-29_3693937de6d6280132d6c19d1d23a218_cryptolocker.exe
-
Size
34KB
-
MD5
3693937de6d6280132d6c19d1d23a218
-
SHA1
1b6ed901bf904b79c3932d57651df033f525c78d
-
SHA256
62b9f4c1412db1b2c729ba1e31e1bcbb3d68bfb87a53f1c89b09b0bd9ad3ecbc
-
SHA512
7ecaff1e3dc4a15fb573591d36b328b1de07bc839a88580d53a3bebe3095aa266cf32a82172213d089f92a79c1c8da5523000a98ffd7f9d440f6b2239cec85aa
-
SSDEEP
384:btBYQg/WIEhUCSNyepEjYnDOAlzVol6U/zzo+tkq4l8tFFxE2B0qp:btB9g/WItCSsAGjX7r3BTp
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x000400000001e980-12.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation 2024-02-29_3693937de6d6280132d6c19d1d23a218_cryptolocker.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation gewos.exe -
Executes dropped EXE 1 IoCs
pid Process 3208 gewos.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4344 wrote to memory of 3208 4344 2024-02-29_3693937de6d6280132d6c19d1d23a218_cryptolocker.exe 90 PID 4344 wrote to memory of 3208 4344 2024-02-29_3693937de6d6280132d6c19d1d23a218_cryptolocker.exe 90 PID 4344 wrote to memory of 3208 4344 2024-02-29_3693937de6d6280132d6c19d1d23a218_cryptolocker.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-29_3693937de6d6280132d6c19d1d23a218_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-29_3693937de6d6280132d6c19d1d23a218_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\gewos.exe"C:\Users\Admin\AppData\Local\Temp\gewos.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:3208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD546568c3c6cb8c77ced0fff5986953175
SHA1babd1ba3b680b017438d29600a9790b807931f94
SHA25628272891148191167d709908d8c5db0317a58f5a2d491c504331a29d27760636
SHA5126112e4398e7a7b2c76c063f723b096bf846feb00cd42588131747eeb985303cd97cb089ceca7fdfea81c54d13b03ea07b1fbed57878a603fc0f19e674cc29ccb