Analysis
-
max time kernel
138s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 23:33
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-22_e71d3f228d2d57e3c405b2c778a3efad_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-22_e71d3f228d2d57e3c405b2c778a3efad_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-22_e71d3f228d2d57e3c405b2c778a3efad_cryptolocker.exe
-
Size
38KB
-
MD5
e71d3f228d2d57e3c405b2c778a3efad
-
SHA1
efbb97a2414633cf7ce71f3b50d22f9a430704b8
-
SHA256
8a9449e107fa9bc3a688f1d3ab2523eae88ee249165b4608c4c7267016ca4c33
-
SHA512
e164747cb659b083a5708c9dd9d2933d591ea1cbb4aa83661af990743fee1db8d0aa6739b7654b72a7ad7e00bd1dde223b29e02e0f9858e14ac2a60c9b163b96
-
SSDEEP
384:btBYQg/WIEhUCSNyepEjYnDOAlzVol6U/zzo+tkq4XDIwNiJXxXunRSy3Vq:btB9g/WItCSsAGjX7e9N0hunRv0
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\gewos.exe CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
2024-05-22_e71d3f228d2d57e3c405b2c778a3efad_cryptolocker.exegewos.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 2024-05-22_e71d3f228d2d57e3c405b2c778a3efad_cryptolocker.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation gewos.exe -
Executes dropped EXE 1 IoCs
Processes:
gewos.exepid process 1064 gewos.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
2024-05-22_e71d3f228d2d57e3c405b2c778a3efad_cryptolocker.exedescription pid process target process PID 2340 wrote to memory of 1064 2340 2024-05-22_e71d3f228d2d57e3c405b2c778a3efad_cryptolocker.exe gewos.exe PID 2340 wrote to memory of 1064 2340 2024-05-22_e71d3f228d2d57e3c405b2c778a3efad_cryptolocker.exe gewos.exe PID 2340 wrote to memory of 1064 2340 2024-05-22_e71d3f228d2d57e3c405b2c778a3efad_cryptolocker.exe gewos.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_e71d3f228d2d57e3c405b2c778a3efad_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-22_e71d3f228d2d57e3c405b2c778a3efad_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\gewos.exe"C:\Users\Admin\AppData\Local\Temp\gewos.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:1064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD511d26def4edb4a709db0e5192c2858ec
SHA1096a04f918872281aac80153e2683173702aae18
SHA25605178359bd9b14d944086effba093a29d78ab88471410c74a565f6c1e3fb9887
SHA51255f249363abc2de2b6f9caf9e240b997e50f82dc90d0690405fd54bf6d44e42a20384cb9d2eb50bd43a87fb540a7e0d896ccb231c41d9b83e40dd05ce3756fdd
-
Filesize
185B
MD5e3a46d1a3181190008f7ba4d0597a807
SHA1329b5d5d1e0b3c821228bba57192d1ae1d88bec7
SHA2561ecbaec26e3170c6ad06ccbf66843b3910fa6c367ff9bb83eea3ec3b8f7d0b55
SHA51253f64764478660d38bd19a452ab05008ecf64374a8df292fa3d2a9acb6d304b8bae713500f49c0fb76f61fc0ad4d8b03bcc0a739a6bcbb403e90b8829d2b15ec