Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/04/2024, 02:42

General

  • Target

    2024-04-23_37ba41ff73fd34c8cc7ba1ca74f4f8d2_cryptolocker.exe

  • Size

    40KB

  • MD5

    37ba41ff73fd34c8cc7ba1ca74f4f8d2

  • SHA1

    39b0029ac1b2c98bef1892d117d0c34dd3c59d10

  • SHA256

    56f39f6007c6a8f3010b3125308b2484537b81273fdbcb39204c1d9d3c5fe498

  • SHA512

    7a14bb6ab8b42d6046087bcb42027c3592693947e2591731b23462087d48e6db6abdd305221b232ff78ff1456251e65ef2a2136dbbf4e23c62f4c74ea8e3e541

  • SSDEEP

    384:btBYQg/WIEhUCSNyepEjYnDOAlzVol6U/zzo+tkq4XDIwNiJXxXunKzH15U/ER:btB9g/WItCSsAGjX7e9N0hunKLYu

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-23_37ba41ff73fd34c8cc7ba1ca74f4f8d2_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-23_37ba41ff73fd34c8cc7ba1ca74f4f8d2_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4712
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:4872

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\gewos.exe

          Filesize

          40KB

          MD5

          c7116518ac6f3471bdf34c79883bf258

          SHA1

          3e7c5a8f1b330af8863ec151ec76636a8129f9dd

          SHA256

          c87889dbf8affce4d3966d3a257e3bbc79a10579b9c4d6d3bbe5a2c3fe91e5f4

          SHA512

          8f79e79bda03f5b806743d4fb62bfa2cdc64474bf2a225fc1cb6ed2da8393f746f4261df896e10c9fe6bc9fbdb7dfdaddbe848217b7417c66119359f25eb2b58

        • memory/4712-0-0x0000000002080000-0x0000000002086000-memory.dmp

          Filesize

          24KB

        • memory/4712-1-0x0000000002080000-0x0000000002086000-memory.dmp

          Filesize

          24KB

        • memory/4712-2-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/4872-24-0x00000000005A0000-0x00000000005A6000-memory.dmp

          Filesize

          24KB