Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 05:04
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-21_870ed3c8f2502512727f4db938461974_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-21_870ed3c8f2502512727f4db938461974_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-21_870ed3c8f2502512727f4db938461974_cryptolocker.exe
-
Size
37KB
-
MD5
870ed3c8f2502512727f4db938461974
-
SHA1
ac0b54516184b6cfa870979cbace898e84b1d7dd
-
SHA256
e4317473aa8174626cbb6523e43b0a91125380239ab34ebe6620f9d5c0f97869
-
SHA512
586f16971078cb099e73eb32b7c6e0251cf8e929034ef108eb5934b760702d0e09cc946e8cd56c23ca871b12d0dac1f13347c5fb24d266ea94baaf5d432c203b
-
SSDEEP
768:b7o/2n1TCraU6GD1a4Xt9bRU6zA6o36mri:bc/y2lLRU6zA6qG
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x00090000000235b7-12.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 2024-05-21_870ed3c8f2502512727f4db938461974_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 112 rewok.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2284 wrote to memory of 112 2284 2024-05-21_870ed3c8f2502512727f4db938461974_cryptolocker.exe 91 PID 2284 wrote to memory of 112 2284 2024-05-21_870ed3c8f2502512727f4db938461974_cryptolocker.exe 91 PID 2284 wrote to memory of 112 2284 2024-05-21_870ed3c8f2502512727f4db938461974_cryptolocker.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-21_870ed3c8f2502512727f4db938461974_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-21_870ed3c8f2502512727f4db938461974_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\rewok.exe"C:\Users\Admin\AppData\Local\Temp\rewok.exe"2⤵
- Executes dropped EXE
PID:112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=1288,i,11746347647270949551,7786733067759450703,262144 --variations-seed-version --mojo-platform-channel-handle=3936 /prefetch:81⤵PID:3168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD52f5dd1c694a87727a5bb464137ba9d23
SHA150985bb7be27eb283aa61587f258c1268295ba21
SHA256744799267705e31be49ff24857435d231b828afb0b24321e19a1b809a705f577
SHA5124f9b4480c270d6b00b4eb9ae3ae671f85d40f66a7a6ff374914c007f169ddee7a9b26f9681e0fc92903eb7dc34d07614b043182e41cdf4df9bfddf5ebb88cc34