Analysis

  • max time kernel
    92s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/05/2024, 04:38

General

  • Target

    2024-05-01_3da78bf9b64b9d60610ede65e1b0cc45_cryptolocker.exe

  • Size

    62KB

  • MD5

    3da78bf9b64b9d60610ede65e1b0cc45

  • SHA1

    023de9c9ab3bca890b170b2320b9bcc2bb409c68

  • SHA256

    c10f7768814ce30aedb8bc4e8380c0a32d42412933bd3a0e09e2d90932a8337b

  • SHA512

    6dfe02f3d417afb0def3b420fe6bca2e004c9a38704e3b98e5311d6d654ee41a18ab5430ba086184fac858d98cf20af6ceee63243b1b3f905a77b17b29184e71

  • SSDEEP

    1536:btB9g/xtCSKfxLIc//Xr+/AO/kIZ3ft2nVuTKB6nggOlHdUHaF:btng54SMLr+/AO/kIhfoKMHdb

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-01_3da78bf9b64b9d60610ede65e1b0cc45_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-01_3da78bf9b64b9d60610ede65e1b0cc45_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2452
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:1044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\gewos.exe

    Filesize

    62KB

    MD5

    5e722d5482fcad74ba47b1420d3a5bfb

    SHA1

    3fa859780f5152929fd22ed35802cfbe80a313d0

    SHA256

    e34e51cebc8f063c56da814565308a4bd7e79551d76496db9f1d38471794adc4

    SHA512

    17f3c5bd3b0498d1c9631c7264a1d6b034e95b03048f17215849d50e9c74cf194bf889ddf51ad5ae76dd5f22b94ece634e94dedd524a37b3afbedb770923ee62

  • memory/1044-25-0x0000000002200000-0x0000000002206000-memory.dmp

    Filesize

    24KB

  • memory/2452-0-0x0000000000600000-0x0000000000606000-memory.dmp

    Filesize

    24KB

  • memory/2452-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2452-8-0x0000000000600000-0x0000000000606000-memory.dmp

    Filesize

    24KB