Analysis

  • max time kernel
    147s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-03-2024 02:23

General

  • Target

    2024-03-11_62ea7260ba1618714cd1be6bf873d50f_cryptolocker.exe

  • Size

    57KB

  • MD5

    62ea7260ba1618714cd1be6bf873d50f

  • SHA1

    6d4d60372490a8c122580a23ea06280d2f3086db

  • SHA256

    973a4359e0bb05edcb2e78508e999de9dae0ef5d1e0f4fb482b88ac97ced8513

  • SHA512

    ee73237a91173ef4f68f30c293e53c07c602de047b986b8b487a5d389bdede07fbf6e6f4437f41af9b0530e9f0be43504014a0a053243b08fc7fdd0b507bf380

  • SSDEEP

    1536:btB9g/xtCSKfxLIc//Xr+/AO/kIZ3ft2nVuTKB6nggOlHdUH9:btng54SMLr+/AO/kIhfoKMHdU

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-11_62ea7260ba1618714cd1be6bf873d50f_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-11_62ea7260ba1618714cd1be6bf873d50f_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2736
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:4368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\gewos.exe

    Filesize

    58KB

    MD5

    a7168bb654fb045241fd69b7d27253c0

    SHA1

    3f32b195e4f98a38404746f3c74922ca4b73b678

    SHA256

    37e10fad764734940b32aad0e0dc163a064bcfb73668e0f387348e3c3b8b77ee

    SHA512

    ecf170b9b04e7a48428f8d10ceed8bc57fb55cbc7c32f2447da7095bad476cb1f7a9b46cb94938ce168993daeb2fd30f13f252d4a51b368c5bf5b339a743aba9

  • memory/2736-0-0x0000000002350000-0x0000000002356000-memory.dmp

    Filesize

    24KB

  • memory/2736-1-0x0000000002350000-0x0000000002356000-memory.dmp

    Filesize

    24KB

  • memory/2736-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/4368-20-0x0000000002090000-0x0000000002096000-memory.dmp

    Filesize

    24KB