Analysis

  • max time kernel
    156s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/03/2024, 17:52

General

  • Target

    2024-03-15_ed92b8c8fe7bb08326e5286a3eabf2af_cryptolocker.exe

  • Size

    44KB

  • MD5

    ed92b8c8fe7bb08326e5286a3eabf2af

  • SHA1

    cbe2107abcde96f18a8e583fbdc0c4981e065024

  • SHA256

    5e6de903756fec3d12290b0dcd9c50615739924b66ab4edeaf2a2cb5c4aa4e6b

  • SHA512

    3a40624e9f6715fd4758e4ff4478689f74b385d3ba433f2c3e8420ea303068174b68b9028aba720d308898cabeb3c332e186fbb5cdfee6a330ba954521de045e

  • SSDEEP

    768:btB9g/WItCSsAGjX7r3BPOMHoc/QQJP5B:btB9g/xtCSKfxLIc/p

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-15_ed92b8c8fe7bb08326e5286a3eabf2af_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-15_ed92b8c8fe7bb08326e5286a3eabf2af_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4216
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:3060

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\gewos.exe

    Filesize

    44KB

    MD5

    d250400d83395b0be8ffdd3434498332

    SHA1

    cdda397e1e18c09e847c7eb6c7b390ca5ec4ef01

    SHA256

    e3e3bceb9793383439a0fb32ec6a4292e5fb0784c5867186f8a9b129f0957739

    SHA512

    1ae76a234d64851a8d7a94caad0a8b0db2108d78d4166f2b5dbe604939776578f3d8db67ab0f886a26a9f5b40cee42a461a603cd1efd539b2e5e79e5d5a9f758

  • memory/4216-0-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/4216-1-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/4216-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB