Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 01:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-19_23ce4cb6f5e60c3438a071cce3fa0c5d_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-19_23ce4cb6f5e60c3438a071cce3fa0c5d_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-19_23ce4cb6f5e60c3438a071cce3fa0c5d_cryptolocker.exe
-
Size
58KB
-
MD5
23ce4cb6f5e60c3438a071cce3fa0c5d
-
SHA1
9192ac60c4cc6ee69da3d5d364359668e0f76561
-
SHA256
2ce5b1cb15878bb9d606e269a644139b3e8df346155572c4bbd91ac1af5c8e5a
-
SHA512
10de205fc11d019859f0390ea69d8538abd7ed7e0295ac5d6398402469df25c8e9edbc525c5f017d0ad4e2e5c2dbe5dfd10e0d8de79d4325e581e458c2592296
-
SSDEEP
1536:btB9g/xtCSKfxLIc//Xr+/AO/kIZ3ft2nVuTKB6nggOlHdUHb:btng54SMLr+/AO/kIhfoKMHde
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x0008000000022745-12.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation 2024-03-19_23ce4cb6f5e60c3438a071cce3fa0c5d_cryptolocker.exe Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation gewos.exe -
Executes dropped EXE 1 IoCs
pid Process 3984 gewos.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2436 wrote to memory of 3984 2436 2024-03-19_23ce4cb6f5e60c3438a071cce3fa0c5d_cryptolocker.exe 88 PID 2436 wrote to memory of 3984 2436 2024-03-19_23ce4cb6f5e60c3438a071cce3fa0c5d_cryptolocker.exe 88 PID 2436 wrote to memory of 3984 2436 2024-03-19_23ce4cb6f5e60c3438a071cce3fa0c5d_cryptolocker.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_23ce4cb6f5e60c3438a071cce3fa0c5d_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-19_23ce4cb6f5e60c3438a071cce3fa0c5d_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\gewos.exe"C:\Users\Admin\AppData\Local\Temp\gewos.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:3984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD5440108e3c7c8d3c5a08060721dc6f2f6
SHA1a73fc92e820fd1da746e289fa1f015da5909bae5
SHA25644b31a0d50fac8b8a0d0e894a3258c99487181889a235d60dbd3e0c13885f2c9
SHA512eb02f7621d9091d89fb0fe4a5801ec6b717ac7285cdaebf0040e36974e3d8ca9416b279369f7a32cff20d5cab5cab184ab910fc856b37670368759a696fef07d