Analysis

  • max time kernel
    147s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/03/2024, 15:33

General

  • Target

    2024-03-18_3d8e45dce507c56e44aa590bedaac072_cryptolocker.exe

  • Size

    35KB

  • MD5

    3d8e45dce507c56e44aa590bedaac072

  • SHA1

    9af95e80d9171ff31af7e0d7ac2a756bff16eb8d

  • SHA256

    cb7093a83b1e35254cc4daa2613caeedd27f85198d588252bafbb8cf840cfc8f

  • SHA512

    e4dfcc55d2c33c05fdfc8bdb19147318217fa80335e144698bf69f6491a10df228410494d98975e28c98700b4900f5717011f4ac1667130f5c3a0ba6e61cdd93

  • SSDEEP

    384:btBYQg/WIEhUCSNyepEjYnDOAlzVol6U/zzo+tkq4l8tFFxE2B0q8U4:btB9g/WItCSsAGjX7r3BTQ

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-18_3d8e45dce507c56e44aa590bedaac072_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-18_3d8e45dce507c56e44aa590bedaac072_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4620
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:5012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\gewos.exe

    Filesize

    35KB

    MD5

    60fca21150c47ef4428286f105e1e0a3

    SHA1

    ef7c374defcce410747dd6cd2040ebcae183bdde

    SHA256

    15a4be401cd7cbbf9fbec4f90f6b630c036c67ac1dabcc742d879d65228e3046

    SHA512

    3b988b2a91bd9d42b075ff25b68f83dc594ee15013e62ff4cdd80a2e832ea7730425063ade15938c4b1aa66a8a0767c4a4bd82c46aa7a7600352eb4e7661306c

  • memory/4620-0-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/4620-1-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/4620-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/5012-21-0x0000000002120000-0x0000000002126000-memory.dmp

    Filesize

    24KB