Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10-03-2024 09:52
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-10_ffc0e0aac5a40a83d700260f0643e5b8_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-03-10_ffc0e0aac5a40a83d700260f0643e5b8_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-03-10_ffc0e0aac5a40a83d700260f0643e5b8_cryptolocker.exe
-
Size
34KB
-
MD5
ffc0e0aac5a40a83d700260f0643e5b8
-
SHA1
9f00cc25927aa70b056b906dc467fbd572f00729
-
SHA256
bd69c931b19d15517d25de9dbef3ee7789edc457f8e0237273a811eb80e7cc4d
-
SHA512
bc37bb972202f1044b970071ad202fdaa75d7742737407dc25272e504febf29045e4413f5b6f6877489f8c675fe0c79119f399a3e7bdada258eec764f84145b0
-
SSDEEP
384:bmM0V/YPvnr801TRoUGPh4TKt6ATt1DqgPa3s/zzoCt9/B1RU3qE4kb7:b7o/2n1TCraU6GD1a4Xt9bRU6zA7
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x00080000000231f7-12.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 2024-03-10_ffc0e0aac5a40a83d700260f0643e5b8_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 4644 rewok.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2816 wrote to memory of 4644 2816 2024-03-10_ffc0e0aac5a40a83d700260f0643e5b8_cryptolocker.exe 85 PID 2816 wrote to memory of 4644 2816 2024-03-10_ffc0e0aac5a40a83d700260f0643e5b8_cryptolocker.exe 85 PID 2816 wrote to memory of 4644 2816 2024-03-10_ffc0e0aac5a40a83d700260f0643e5b8_cryptolocker.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-10_ffc0e0aac5a40a83d700260f0643e5b8_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-10_ffc0e0aac5a40a83d700260f0643e5b8_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\rewok.exe"C:\Users\Admin\AppData\Local\Temp\rewok.exe"2⤵
- Executes dropped EXE
PID:4644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5c907284cd5363aa2b8eea34b27b41422
SHA1f91831635ed54af4de175e4dd042ba829ca388aa
SHA25644dac4ad2466aef8f1d83f55b699273da5da5d54929ab91b7081488a893f5e54
SHA5128922ed24275995c4fdd2e7cbe1fe7591a33836fb8aea1587716659b324a2b3fefb3e4a7897cda1eb3aa366ec25b33fffd8fc3b6171a0f4defa12bb3f439f068e