Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/04/2024, 17:30

General

  • Target

    2024-04-30_cd6986982567d6eb7f34b6c37470c57f_cryptolocker.exe

  • Size

    39KB

  • MD5

    cd6986982567d6eb7f34b6c37470c57f

  • SHA1

    da5b5f9b03d5a01a1a5412e4536a7136f417c721

  • SHA256

    76d96440920903feab31a57db74faa6e6669bf0162909f9d82bddc167b4f8e94

  • SHA512

    0b7dc9456e2667ba339d820a797fecc822134bcbc0325d88a317e6e75851a8cf68fc81720418f29208a829bd5c5e658e1dd7145b8135f93c111cc962a08018b8

  • SSDEEP

    384:btBYQg/WIEhUCSNyepEjYnDOAlzVol6U/zzo+tkq4XDIwNiJXxXunKzH15U/EG:btB9g/WItCSsAGjX7e9N0hunKLYp

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-30_cd6986982567d6eb7f34b6c37470c57f_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-30_cd6986982567d6eb7f34b6c37470c57f_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:428
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Executes dropped EXE
      PID:704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\gewos.exe

    Filesize

    40KB

    MD5

    b223615543e2f62b83cdb49fe41a09c3

    SHA1

    654af7ee4ae25c5df26a9d8fa02ae073cc82f69c

    SHA256

    f24722a138cc43d073766c914ec26d570f807b6fd29c1c0aae912743f14b75c8

    SHA512

    714de50d54b2de57c43f3f2795685fd2709c1deceb3033808906459857cc4bf97edbbf2503898dc6d35ed0a6ebfe11394bc70d9e6702ed0f2f8d0fa49be4b560

  • memory/428-0-0x0000000000730000-0x0000000000736000-memory.dmp

    Filesize

    24KB

  • memory/428-5-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/428-8-0x0000000000730000-0x0000000000736000-memory.dmp

    Filesize

    24KB

  • memory/704-25-0x0000000002020000-0x0000000002026000-memory.dmp

    Filesize

    24KB