Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/05/2024, 08:43

General

  • Target

    2024-05-21_33aae13b63eccf63a03fe77fb1956d8e_cryptolocker.exe

  • Size

    62KB

  • MD5

    33aae13b63eccf63a03fe77fb1956d8e

  • SHA1

    7ffcb21e233879e05ee5a9c69b9366f583934237

  • SHA256

    36afe97717751600e706943570c68abc1ce52c5ae74553a9a763f426ca09627d

  • SHA512

    0221d6ddc0c054a9cd4f3813c7ee5d7e91e684c73ddd3270ba17c40e14f5c9b46282f1a8a29bfe9520bad61ddeafaa4f3ba68b6dfbb257b5b983d62a32c0c978

  • SSDEEP

    1536:btB9g/xtCSKfxLIc//Xr+/AO/kIZ3ft2nVuTKB6nggOlHdUHZnxi:btng54SMLr+/AO/kIhfoKMHdag

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-21_33aae13b63eccf63a03fe77fb1956d8e_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-21_33aae13b63eccf63a03fe77fb1956d8e_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3228
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:4940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\gewos.exe

    Filesize

    62KB

    MD5

    f3e5b745c9740091a065105e61f0c566

    SHA1

    ec5ccb6c89bfcf9bdc71b1e6d8d3305bac161582

    SHA256

    7714b388db5eb1bee6b6ea2378d52765319a0e4fc0be2bb9e034481b448f8133

    SHA512

    1c44c2d583db2eec07d337001ad5e694761a110eeb68c6af878a659ff1731622fbcdd598b40e4b12fb4c00811034d8f3877ac104f3b70244f1c51c50ee012560

  • C:\Users\Admin\AppData\Local\Temp\gewosik.exe

    Filesize

    185B

    MD5

    208fe836b168c20ad66a51306c3c78b5

    SHA1

    0a619d3505dd43affae8e456463418e220867e04

    SHA256

    0c8e95228637b48ca9657c612bacfa67cdbe6f294dcd25ac5fe64ecbd8bc198e

    SHA512

    0b4d3606c7b2133bd9ae93aa446b04e5ce303bd1f68644454093e2ef36c9ce2bd43860e2ae1c044f9fc6721c44ab175880f70a3388c8bc9377d50ab48ccac40a

  • memory/3228-0-0x0000000002110000-0x0000000002116000-memory.dmp

    Filesize

    24KB

  • memory/3228-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/3228-8-0x0000000002110000-0x0000000002116000-memory.dmp

    Filesize

    24KB

  • memory/4940-25-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB