Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/05/2024, 17:06

General

  • Target

    2024-05-14_679ee8d59962521d3f720d8e1fa76ce6_cryptolocker.exe

  • Size

    44KB

  • MD5

    679ee8d59962521d3f720d8e1fa76ce6

  • SHA1

    366bac5a975c44d4c3abfd632bf2e5507cb3d765

  • SHA256

    4a0d870518bacea1cb1e73759e15eab76b42adae14e3f205f3dccb30fdb6b5c2

  • SHA512

    eb07396b558011b81617d555224f24dcdb8965b2619e507e01f978587146eb25a6f67bcfebc1d20abbdd45242ce0277f61fd5cdbde11f90a8ecebc0ec6fcd605

  • SSDEEP

    768:b7o/2n1TCraU6GD1a4X0WcO+wMVm+slAMphqo:bc/y2lkF0+Beqo

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-14_679ee8d59962521d3f720d8e1fa76ce6_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-14_679ee8d59962521d3f720d8e1fa76ce6_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4128
    • C:\Users\Admin\AppData\Local\Temp\rewok.exe
      "C:\Users\Admin\AppData\Local\Temp\rewok.exe"
      2⤵
      • Executes dropped EXE
      PID:3388

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rewok.exe

          Filesize

          44KB

          MD5

          e310d63e71452a6783ea74a100bb9d9a

          SHA1

          2fd86152c67d86627e3db3e9d0010d319ec47319

          SHA256

          b5ceaf57cd6c4349cbf2f671db0f099f6e9d77e9b0fc2282f8997a326c098aed

          SHA512

          2ada54697032de6515cd172410ac2a89910bd4e5a6b49cbd80465a072b51018e1f75b57f120c2b7fb17d742ffcf27f1261e42ebbe18330673561df241e8beb94

        • memory/3388-25-0x0000000002020000-0x0000000002026000-memory.dmp

          Filesize

          24KB

        • memory/4128-0-0x0000000002160000-0x0000000002166000-memory.dmp

          Filesize

          24KB

        • memory/4128-1-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/4128-8-0x0000000002160000-0x0000000002166000-memory.dmp

          Filesize

          24KB