Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 02:26

General

  • Target

    2024-05-22_2aa0083f422bac627f7b57f0bf551dc3_cryptolocker.exe

  • Size

    36KB

  • MD5

    2aa0083f422bac627f7b57f0bf551dc3

  • SHA1

    44b75b6c6ca036644bf2211107d37396dee8a56e

  • SHA256

    0fc74701e91322421409f6e700b515963c0c58ca2eba5ac9277931f01f8dd4c1

  • SHA512

    bbe6649843bb37acad76fc3d86f6c77dbd1523bdab612aead9598194a3f509db6d6d22b684958ba616aae8b301d26658009300009b5629ec7f133bfdb609d53c

  • SSDEEP

    384:btBYQg/WIEhUCSNyepEjYnDOAlzVol6U/zzo+tkq4l8tFFxE2B0qZvvb:btB9g/WItCSsAGjX7r3BTZvvb

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-22_2aa0083f422bac627f7b57f0bf551dc3_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-22_2aa0083f422bac627f7b57f0bf551dc3_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4296
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:4456
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3896 --field-trial-handle=2744,i,16362475727591565961,3676688664819797550,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:2020

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\gewos.exe

      Filesize

      36KB

      MD5

      4a7a16556b2ad3444701e55b43f6ffe7

      SHA1

      1f6ffd814693e6bdf54bfd587ba8fa41706521e1

      SHA256

      afe8ec7e47d9aa09da18415834b63c266ef31366d4d93c62acc66560940c07c0

      SHA512

      a9645d7f2786f85aaed66a41e6747842ef25e8b1b49185570b98f8270c8a05f3d083c1abe6c404747dccd5e926209ea17082596ea2e6ebc2eafd037fd52c9960

    • C:\Users\Admin\AppData\Local\Temp\gewosik.exe

      Filesize

      185B

      MD5

      c5e0e5732feee87e65dd3c36e6f674fd

      SHA1

      41e03fb25d3dc69a9f2cae1a9e4e63b1fa69058d

      SHA256

      21751bc8dfd1836c6cb2c5e4115ec19fcc6c74aade3f2d4292f79a0685790cf2

      SHA512

      1863f67f5827380f3a775ee60bb64fd1fe5d333d959b74d9eab5afafc095bbd9608b7e7eb9440cf40fe645598e0d88d4b53decc43a8c45e57a4ad28df110c4a2

    • memory/4296-0-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

      Filesize

      24KB

    • memory/4296-1-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

      Filesize

      24KB

    • memory/4296-2-0x0000000000400000-0x0000000000406000-memory.dmp

      Filesize

      24KB

    • memory/4456-25-0x0000000002210000-0x0000000002216000-memory.dmp

      Filesize

      24KB