Analysis
-
max time kernel
156s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 17:52
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-15_ed92b8c8fe7bb08326e5286a3eabf2af_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-03-15_ed92b8c8fe7bb08326e5286a3eabf2af_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-15_ed92b8c8fe7bb08326e5286a3eabf2af_cryptolocker.exe
-
Size
44KB
-
MD5
ed92b8c8fe7bb08326e5286a3eabf2af
-
SHA1
cbe2107abcde96f18a8e583fbdc0c4981e065024
-
SHA256
5e6de903756fec3d12290b0dcd9c50615739924b66ab4edeaf2a2cb5c4aa4e6b
-
SHA512
3a40624e9f6715fd4758e4ff4478689f74b385d3ba433f2c3e8420ea303068174b68b9028aba720d308898cabeb3c332e186fbb5cdfee6a330ba954521de045e
-
SSDEEP
768:btB9g/WItCSsAGjX7r3BPOMHoc/QQJP5B:btB9g/xtCSKfxLIc/p
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x0008000000023240-12.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\Control Panel\International\Geo\Nation 2024-03-15_ed92b8c8fe7bb08326e5286a3eabf2af_cryptolocker.exe Key value queried \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\Control Panel\International\Geo\Nation gewos.exe -
Executes dropped EXE 1 IoCs
pid Process 3060 gewos.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4216 wrote to memory of 3060 4216 2024-03-15_ed92b8c8fe7bb08326e5286a3eabf2af_cryptolocker.exe 90 PID 4216 wrote to memory of 3060 4216 2024-03-15_ed92b8c8fe7bb08326e5286a3eabf2af_cryptolocker.exe 90 PID 4216 wrote to memory of 3060 4216 2024-03-15_ed92b8c8fe7bb08326e5286a3eabf2af_cryptolocker.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-15_ed92b8c8fe7bb08326e5286a3eabf2af_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-15_ed92b8c8fe7bb08326e5286a3eabf2af_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\gewos.exe"C:\Users\Admin\AppData\Local\Temp\gewos.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5d250400d83395b0be8ffdd3434498332
SHA1cdda397e1e18c09e847c7eb6c7b390ca5ec4ef01
SHA256e3e3bceb9793383439a0fb32ec6a4292e5fb0784c5867186f8a9b129f0957739
SHA5121ae76a234d64851a8d7a94caad0a8b0db2108d78d4166f2b5dbe604939776578f3d8db67ab0f886a26a9f5b40cee42a461a603cd1efd539b2e5e79e5d5a9f758