Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-04-2024 03:27

General

  • Target

    2024-04-26_179d3282117255a548bd761c83d8d73f_cryptolocker.exe

  • Size

    63KB

  • MD5

    179d3282117255a548bd761c83d8d73f

  • SHA1

    60e6057f2e081134836d0bd84e46375e8c4e41ff

  • SHA256

    309015b766fa379cdf3ff5082854403334fff56c1cfe1ab9e2de40a06773a915

  • SHA512

    fb39c5374b4f0b18458c4fc63919093da62cabbdfa95b87339a209f92136bcc9e270b651d3efd153ba17f83c4475b70dc01f191105f8d11f6037dd50d193ce8f

  • SSDEEP

    1536:btB9g/xtCSKfxLIc//Xr+/AO/kIZ3ft2nVuTKB6nggOlHdUHaxO:btng54SMLr+/AO/kIhfoKMHdPO

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-26_179d3282117255a548bd761c83d8d73f_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-26_179d3282117255a548bd761c83d8d73f_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:972
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Executes dropped EXE
      PID:1620
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
    1⤵
      PID:1596
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k UnistackSvcGroup
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1472

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\gewos.exe

      Filesize

      63KB

      MD5

      15015535bd2cda369afbb05f48e9fbeb

      SHA1

      2819163913de2fd32d1eea243ad8da627f9ae24c

      SHA256

      bfff6d9d99fdf273333666ccf161f1ad19e61dee843fc400d101bf116fb0dd8b

      SHA512

      4eb604b7bd142b6ebddc72a87e8872842c0a09b5a62e8ab3a54c4b01b6a46f4ca55ee8544a01ba981dff6b5f5ed723a90bd619e4efe92eb8dcdb3e93b23a42d4

    • memory/972-0-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

      Filesize

      24KB

    • memory/972-1-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

      Filesize

      24KB

    • memory/972-2-0x0000000000400000-0x0000000000406000-memory.dmp

      Filesize

      24KB

    • memory/1472-40-0x000001803A340000-0x000001803A350000-memory.dmp

      Filesize

      64KB

    • memory/1472-56-0x000001803A440000-0x000001803A450000-memory.dmp

      Filesize

      64KB

    • memory/1472-72-0x0000018042770000-0x0000018042771000-memory.dmp

      Filesize

      4KB

    • memory/1472-74-0x00000180427A0000-0x00000180427A1000-memory.dmp

      Filesize

      4KB

    • memory/1472-75-0x00000180427A0000-0x00000180427A1000-memory.dmp

      Filesize

      4KB

    • memory/1472-76-0x00000180428B0000-0x00000180428B1000-memory.dmp

      Filesize

      4KB

    • memory/1620-25-0x0000000002D60000-0x0000000002D66000-memory.dmp

      Filesize

      24KB