Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-04-2024 03:35

General

  • Target

    2024-04-21_1afc95043205720a1caf046e543538ce_cryptolocker.exe

  • Size

    35KB

  • MD5

    1afc95043205720a1caf046e543538ce

  • SHA1

    6771160edacd56c8f814fbb6893c7540fe890c43

  • SHA256

    c8ac1c9d7a9c2f38b835c1a6f802ec64b3dd24118b90fa2a3cae28f0de4a44aa

  • SHA512

    48047a254be8a76410d96629d969badb8bf0d0600542e25004b21147dfce44e79aba6b4481b9c945719a37012ee09a97ccef1f9dd237f6ef2c8831045d943883

  • SSDEEP

    384:btBYQg/WIEhUCSNyepEjYnDOAlzVol6U/zzo+tkq4l8tFFxE2B0q0:btB9g/WItCSsAGjX7r3BT0

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-21_1afc95043205720a1caf046e543538ce_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-21_1afc95043205720a1caf046e543538ce_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1912
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:1400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\gewos.exe

    Filesize

    35KB

    MD5

    f04822315f8e72313a5d3d509bb384ea

    SHA1

    f1611ab85dea22c3742d4297b326fdc6a4659e17

    SHA256

    a8010cbabd4e3ad051c339c1ddedebf746fbcbffddce006207da0450e706723b

    SHA512

    615e7a251e1e0de8bbfa47ba9df592a9a0d013c8387055d0c926271f9de95aad3c58ee6bb724474adf9a81cfe3d79b7078a616ba1b0de3ebea148672041b565b

  • memory/1400-20-0x0000000002D60000-0x0000000002D66000-memory.dmp

    Filesize

    24KB

  • memory/1912-0-0x00000000022D0000-0x00000000022D6000-memory.dmp

    Filesize

    24KB

  • memory/1912-1-0x00000000022D0000-0x00000000022D6000-memory.dmp

    Filesize

    24KB

  • memory/1912-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB