Analysis

  • max time kernel
    141s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-04-2024 14:50

General

  • Target

    2024-04-15_8c5af3107c3113d7cf527cd6f88fd7be_cryptolocker.exe

  • Size

    39KB

  • MD5

    8c5af3107c3113d7cf527cd6f88fd7be

  • SHA1

    4a6a25f000de244513ee558b684e6163d8f0a72c

  • SHA256

    b0bce6cc22f342e3162e2ba65d67061b3633e4123b76c1c6682efe65aefdffea

  • SHA512

    e0a107fdd7b83318125224c7c79ceb9d3f1c106fba2eb23d16ffbfbb743fc5d1e5b0124c1753948d0f6dec4e2deaf614876820a8cc36cef66fd86eb586077c10

  • SSDEEP

    384:btBYQg/WIEhUCSNyepEjYnDOAlzVol6U/zzo+tkq4XDIwNiJXxXunKzH15U/Es:btB9g/WItCSsAGjX7e9N0hunKLYP

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-15_8c5af3107c3113d7cf527cd6f88fd7be_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-15_8c5af3107c3113d7cf527cd6f88fd7be_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:4172
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4292 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:3144

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\gewos.exe

      Filesize

      39KB

      MD5

      cc0507fc8ad705158632ee2e27d89d75

      SHA1

      b55fec24f9d8c7f40a2b6f9d03123a8bdc47db9b

      SHA256

      6ffcdf7986a6623e779093805f67f6b89ec34adeed009a217fa5167409a00680

      SHA512

      0aa125072c17c9bf25904eb866be10de05cb067b88d0fd25dbe28dddad12b4a23758584b66d5ba23a561b7593edc609976bdcce7741503784a871efd2b3abdd3

    • memory/2212-0-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

      Filesize

      24KB

    • memory/2212-1-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

      Filesize

      24KB

    • memory/2212-2-0x0000000000400000-0x0000000000406000-memory.dmp

      Filesize

      24KB

    • memory/4172-17-0x0000000002D60000-0x0000000002D66000-memory.dmp

      Filesize

      24KB