Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/05/2024, 04:33

General

  • Target

    2024-05-09_4fe0921020d6a7ebe11456fcd0a25a2a_cryptolocker.exe

  • Size

    62KB

  • MD5

    4fe0921020d6a7ebe11456fcd0a25a2a

  • SHA1

    73eb9786695bc258395aa37b08cb0184cbd144c3

  • SHA256

    602a439545209af276c2bcdae620ac64fbcb4036083d9e77fe7efa65ba5cb22b

  • SHA512

    50f9649a3e7673c209efc2408a338d4b94ce1c307267ca81a18a3db189597b51345e8709e7eaba24f5300dab677ff951e9e34f39c03c195ae134c38c29f169b4

  • SSDEEP

    1536:btB9g/xtCSKfxLIc//Xr+/AO/kIZ3ft2nVuTKB6nggOlHdUHZnF7HT:btng54SMLr+/AO/kIhfoKMHda9

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-09_4fe0921020d6a7ebe11456fcd0a25a2a_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-09_4fe0921020d6a7ebe11456fcd0a25a2a_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1404
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Executes dropped EXE
      PID:4404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\gewos.exe

    Filesize

    62KB

    MD5

    f178b5fd21fc08784dcd67ce9902fe50

    SHA1

    45dd2f356454cf723d9bb89dd97b4f128ddbade0

    SHA256

    176e8b58bc10e7a9878e83b111fb40f241464f29f4dcba0223954ad551fae101

    SHA512

    87bbf7a77ae3ab5bba2e2068d21879610ce3df91e9296974378a578d72e55cd7c444700d1b65176b3f1592a587457c2cf941e39593a448e539a1ddc2feba8b71

  • memory/1404-0-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/1404-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/1404-8-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/4404-25-0x0000000002D60000-0x0000000002D66000-memory.dmp

    Filesize

    24KB