Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
27/04/2024, 06:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-27_813eb11087333f67a7aa4827f5207e31_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-04-27_813eb11087333f67a7aa4827f5207e31_cryptolocker.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-04-27_813eb11087333f67a7aa4827f5207e31_cryptolocker.exe
-
Size
40KB
-
MD5
813eb11087333f67a7aa4827f5207e31
-
SHA1
1c59dee05e8b9827abfc6849f523a5a2cfe665e3
-
SHA256
1341998e05d084071fa18472aad8b3f86b0f356da6146107768438b5c87b4b33
-
SHA512
212c3e5cdcf7626065fb81bcdd52e336db744015872b27747172f3ee4023393c9b683792b667a7034b09bc5c99c47e49430f28a5b94b6ee92a33bf344bc3113c
-
SSDEEP
384:btBYQg/WIEhUCSNyepEjYnDOAlzVol6U/zzo+tkq4XDIwNiJXxXunKzH15U/EZ/:btB9g/WItCSsAGjX7e9N0hunKLY4/
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x000c000000023b37-12.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation 2024-04-27_813eb11087333f67a7aa4827f5207e31_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 4488 gewos.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4928 wrote to memory of 4488 4928 2024-04-27_813eb11087333f67a7aa4827f5207e31_cryptolocker.exe 88 PID 4928 wrote to memory of 4488 4928 2024-04-27_813eb11087333f67a7aa4827f5207e31_cryptolocker.exe 88 PID 4928 wrote to memory of 4488 4928 2024-04-27_813eb11087333f67a7aa4827f5207e31_cryptolocker.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-27_813eb11087333f67a7aa4827f5207e31_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-27_813eb11087333f67a7aa4827f5207e31_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\gewos.exe"C:\Users\Admin\AppData\Local\Temp\gewos.exe"2⤵
- Executes dropped EXE
PID:4488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD52ccca32b76c034c24b234004b2861a9a
SHA1ab71fed84c2b74e5c24b5dc49f2136d398181b13
SHA256d272d3159c7ebd9e0740ffe5c4cb49d7f3bd33cfd15044e06c03eacbe959d7d9
SHA512ceea64d3afdbd3fa158172bf8c4b02f62c93c1477cf060174f64001beceeaca37536d45c97211072c7b42156fd2b39650784cd1dce9359dae289fee3f3ddab96