Analysis

  • max time kernel
    129s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/05/2024, 21:04

General

  • Target

    2024-05-11_2ea60b931b92206d6c976882b0f06dad_cryptolocker.exe

  • Size

    62KB

  • MD5

    2ea60b931b92206d6c976882b0f06dad

  • SHA1

    a182a8104b8420f5f8c491b46e401b915c3873c5

  • SHA256

    f778cfc087be7738473b2cd5a8cbd7b893e6a72a5efdb343100459c7aec3585e

  • SHA512

    c8d3b6fe0fa8b168132e14c7d2d53bde8aec49f341d514397ece4d8fee2ae01719a3d13e9f084ca3d279e81b9e77e32f6861dddd0a36a5a762b870d03e50d261

  • SSDEEP

    1536:btB9g/xtCSKfxLIc//Xr+/AO/kIZ3ft2nVuTKB6nggOlHdUHZnx:btng54SMLr+/AO/kIhfoKMHdax

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-11_2ea60b931b92206d6c976882b0f06dad_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-11_2ea60b931b92206d6c976882b0f06dad_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3220
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:2924

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\gewos.exe

          Filesize

          62KB

          MD5

          f8068a634c5c6d31444bfd1ced16b0e9

          SHA1

          791688c1e3a96ab9b93309bc8525332167fae5c4

          SHA256

          81748fec97247feb4bd7740be5ed425858d9fa7ecd9b456459aae1e0e8f4c73a

          SHA512

          e1723d236ed4ddb687288f0b6518dea1234299bc65c02cc24425c01a8f1ab9b1366505592fc60dc9ea190d13c421aab33793befdbaac147d84dbaec37f6d2c62

        • C:\Users\Admin\AppData\Local\Temp\gewosik.exe

          Filesize

          185B

          MD5

          0f08f6ee16a19745d13137fe54351921

          SHA1

          09a45adc5b37628fb5d5e9d14905ec6dfb2cb153

          SHA256

          082c2518f7f32421e83741c94d90bd742bcb2306f3331cd3074c59b5cf226cc6

          SHA512

          f21d296a7517e7c94486c42bdeae99e28b0e660f5bf30ca053f9ad00500120dfae53c3fb9d343e75f63073182b3338a4c9ff6df2e2ce1a41b6c6e7815f95f9c0

        • memory/2924-25-0x00000000020D0000-0x00000000020D6000-memory.dmp

          Filesize

          24KB

        • memory/3220-0-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

          Filesize

          24KB

        • memory/3220-1-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/3220-8-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

          Filesize

          24KB