Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 17:06
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-14_679ee8d59962521d3f720d8e1fa76ce6_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-05-14_679ee8d59962521d3f720d8e1fa76ce6_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-14_679ee8d59962521d3f720d8e1fa76ce6_cryptolocker.exe
-
Size
44KB
-
MD5
679ee8d59962521d3f720d8e1fa76ce6
-
SHA1
366bac5a975c44d4c3abfd632bf2e5507cb3d765
-
SHA256
4a0d870518bacea1cb1e73759e15eab76b42adae14e3f205f3dccb30fdb6b5c2
-
SHA512
eb07396b558011b81617d555224f24dcdb8965b2619e507e01f978587146eb25a6f67bcfebc1d20abbdd45242ce0277f61fd5cdbde11f90a8ecebc0ec6fcd605
-
SSDEEP
768:b7o/2n1TCraU6GD1a4X0WcO+wMVm+slAMphqo:bc/y2lkF0+Beqo
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x0006000000022f42-12.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 2024-05-14_679ee8d59962521d3f720d8e1fa76ce6_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 3388 rewok.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4128 wrote to memory of 3388 4128 2024-05-14_679ee8d59962521d3f720d8e1fa76ce6_cryptolocker.exe 81 PID 4128 wrote to memory of 3388 4128 2024-05-14_679ee8d59962521d3f720d8e1fa76ce6_cryptolocker.exe 81 PID 4128 wrote to memory of 3388 4128 2024-05-14_679ee8d59962521d3f720d8e1fa76ce6_cryptolocker.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-14_679ee8d59962521d3f720d8e1fa76ce6_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-14_679ee8d59962521d3f720d8e1fa76ce6_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\rewok.exe"C:\Users\Admin\AppData\Local\Temp\rewok.exe"2⤵
- Executes dropped EXE
PID:3388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5e310d63e71452a6783ea74a100bb9d9a
SHA12fd86152c67d86627e3db3e9d0010d319ec47319
SHA256b5ceaf57cd6c4349cbf2f671db0f099f6e9d77e9b0fc2282f8997a326c098aed
SHA5122ada54697032de6515cd172410ac2a89910bd4e5a6b49cbd80465a072b51018e1f75b57f120c2b7fb17d742ffcf27f1261e42ebbe18330673561df241e8beb94