Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-03-2024 06:45

General

  • Target

    2024-03-14_1c5497bb1aa23fc78002c58a80841557_cryptolocker.exe

  • Size

    44KB

  • MD5

    1c5497bb1aa23fc78002c58a80841557

  • SHA1

    e257e006e0030eb3485c422059b3bb6560129829

  • SHA256

    6381b428dde45f874dd3699882a3b6dbf6a1f7fc8a1acd0206a89631d6084741

  • SHA512

    f64a19394f813ce8594d44c82c1bbeb3d36285664624f0729e107c08e291fb6a05bcba0611cd811423c67c523317d8868d8b287cf2ab0089e46b119e29fbf408

  • SSDEEP

    768:btB9g/WItCSsAGjX7r3BPOMHocM4vUUOmJ+96egDc:btB9g/xtCSKfxLIcMzUw96nc

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-14_1c5497bb1aa23fc78002c58a80841557_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-14_1c5497bb1aa23fc78002c58a80841557_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1548
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:2432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\gewos.exe

    Filesize

    44KB

    MD5

    58671f25de4c50eb2188ccd39a862a99

    SHA1

    94dabbc3ff71966970a21dd24fcf1a8436543c10

    SHA256

    9db878762874ee84411ac5cd3bbabaa141835bd976738d64b5ed5c2c3e939788

    SHA512

    0a17b538b8f1916a497801b2df48958c42b679db6d95bf64e3871e823a30be8debf47a254dcb666c9b0185d828f29cf2594dceb4cffb0010879d1c66655610ac

  • memory/1548-0-0x0000000002260000-0x0000000002266000-memory.dmp

    Filesize

    24KB

  • memory/1548-1-0x0000000002260000-0x0000000002266000-memory.dmp

    Filesize

    24KB

  • memory/1548-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2432-21-0x0000000002010000-0x0000000002016000-memory.dmp

    Filesize

    24KB