Analysis

  • max time kernel
    152s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/03/2024, 19:54

General

  • Target

    2024-03-15_f772a9a525c672c259404f3a46af50ce_cryptolocker.exe

  • Size

    33KB

  • MD5

    f772a9a525c672c259404f3a46af50ce

  • SHA1

    054d18394909fa66f95d6ab7857c4023ecd318a0

  • SHA256

    9ce31132d21bd9166cb501b21223e8a7377599132a4a991a08adb2bff1d436e3

  • SHA512

    7a8e43031ddf3c858d36f4341d9f8b92b035c226b80b3465de8cfc85c3850b3037fb0e6d30e9c3701df4c642e4a9d64a2f5dcc8876406955c5b15bb0f8323f2b

  • SSDEEP

    384:btBYQg/WIEhUCSNyepEjYnDOAlzVol6U/zzo+tkq4l8tFFxE2BoVS71V:btB9g/WItCSsAGjX7r3BoVS7P

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-15_f772a9a525c672c259404f3a46af50ce_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-15_f772a9a525c672c259404f3a46af50ce_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:2388

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\gewos.exe

          Filesize

          33KB

          MD5

          825754678d361381d38cdf66e8711b0b

          SHA1

          14a3630ce2657502934a032d9a56835fd6b2ddf2

          SHA256

          d7a863e98cd908063413261c273c414a0d9e4414d04230fa3ffccee7ba028109

          SHA512

          4073f38050b2c141e2305360b6f28012311dcf1463d62e10ee35e1db4ab723a5470034756d3bcc9ec5677778c9adb00d2a7883720ed913ed789ee5272aea54eb

        • memory/2292-0-0x0000000002350000-0x0000000002356000-memory.dmp

          Filesize

          24KB

        • memory/2292-1-0x0000000002350000-0x0000000002356000-memory.dmp

          Filesize

          24KB

        • memory/2292-2-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/2388-20-0x0000000002110000-0x0000000002116000-memory.dmp

          Filesize

          24KB