Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/04/2024, 06:32

General

  • Target

    2024-04-27_813eb11087333f67a7aa4827f5207e31_cryptolocker.exe

  • Size

    40KB

  • MD5

    813eb11087333f67a7aa4827f5207e31

  • SHA1

    1c59dee05e8b9827abfc6849f523a5a2cfe665e3

  • SHA256

    1341998e05d084071fa18472aad8b3f86b0f356da6146107768438b5c87b4b33

  • SHA512

    212c3e5cdcf7626065fb81bcdd52e336db744015872b27747172f3ee4023393c9b683792b667a7034b09bc5c99c47e49430f28a5b94b6ee92a33bf344bc3113c

  • SSDEEP

    384:btBYQg/WIEhUCSNyepEjYnDOAlzVol6U/zzo+tkq4XDIwNiJXxXunKzH15U/EZ/:btB9g/WItCSsAGjX7e9N0hunKLY4/

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-27_813eb11087333f67a7aa4827f5207e31_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-27_813eb11087333f67a7aa4827f5207e31_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4928
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Executes dropped EXE
      PID:4488

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\gewos.exe

          Filesize

          40KB

          MD5

          2ccca32b76c034c24b234004b2861a9a

          SHA1

          ab71fed84c2b74e5c24b5dc49f2136d398181b13

          SHA256

          d272d3159c7ebd9e0740ffe5c4cb49d7f3bd33cfd15044e06c03eacbe959d7d9

          SHA512

          ceea64d3afdbd3fa158172bf8c4b02f62c93c1477cf060174f64001beceeaca37536d45c97211072c7b42156fd2b39650784cd1dce9359dae289fee3f3ddab96

        • memory/4488-25-0x00000000006F0000-0x00000000006F6000-memory.dmp

          Filesize

          24KB

        • memory/4928-0-0x0000000002160000-0x0000000002166000-memory.dmp

          Filesize

          24KB

        • memory/4928-8-0x0000000002160000-0x0000000002166000-memory.dmp

          Filesize

          24KB

        • memory/4928-1-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB