Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/05/2024, 11:34

General

  • Target

    2024-05-01_7bebc6a62fe229858d41193918b61653_cryptolocker.exe

  • Size

    61KB

  • MD5

    7bebc6a62fe229858d41193918b61653

  • SHA1

    a0ae2105d48fc287f3ccff8863fa1080aad3780b

  • SHA256

    b7ed042b489b334c9c3ce36cb09ac0ac53a6cebcc76ecdc456a74502a29c2349

  • SHA512

    9cb52ac9e35bb83a264f88a913ab3c6a3767afeac6ee54c3ddf7b803bdda38fa43b750e35e675ae50c2a3e6bbdd90f8ac57e4ea2031423f420af60f6238460dd

  • SSDEEP

    1536:btB9g/xtCSKfxLIc//Xr+/AO/kIZ3ft2nVuTKB6nggOlHdUHZnk:btng54SMLr+/AO/kIhfoKMHdak

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-01_7bebc6a62fe229858d41193918b61653_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-01_7bebc6a62fe229858d41193918b61653_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3840
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:1388

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\gewos.exe

    Filesize

    61KB

    MD5

    d7e5c2bbdb6e173f3c5610eace2f1bd2

    SHA1

    09d370510a70501a0095142949a08cfd030106ef

    SHA256

    71c6535a008e3a7a12fd96c3f02d0bb02f048950d8d014c9989dc811cea1dfe4

    SHA512

    734769af974f33b3b4a4c592f10f7fe4232af8d903d744e166e5651d1084126281eb066796d174a0f7db0a083a97840ae0548d12131fd9c64640f857b8d85616

  • memory/1388-25-0x0000000002110000-0x0000000002116000-memory.dmp

    Filesize

    24KB

  • memory/3840-0-0x0000000002160000-0x0000000002166000-memory.dmp

    Filesize

    24KB

  • memory/3840-1-0x0000000002160000-0x0000000002166000-memory.dmp

    Filesize

    24KB

  • memory/3840-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB