Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/05/2024, 14:37

General

  • Target

    2024-05-22_367d12684409341016c43a333c878ed6_cryptolocker.exe

  • Size

    36KB

  • MD5

    367d12684409341016c43a333c878ed6

  • SHA1

    27306e15eebcf0e9b526e9ccab77875fa44b5b33

  • SHA256

    5758aeeb21d4640832d2a01511340b74945f51326e2bf289a3ac8c6dac6f56c3

  • SHA512

    739f61f2f0d431a54e2ee3db8cc03e6fc59613578e1e5f5c645b941479beb8ae7ae74db28698ea932c46950a4c15639ac49fd2ddd0099fb6c112051a80c7b305

  • SSDEEP

    384:btBYQg/WIEhUCSNyepEjYnDOAlzVol6U/zzo+tkq4l8tFFxE2B0qZvvy:btB9g/WItCSsAGjX7r3BTZvvy

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-22_367d12684409341016c43a333c878ed6_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-22_367d12684409341016c43a333c878ed6_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4408
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:4844
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1328 --field-trial-handle=3060,i,1774866140584649235,8085848018931772189,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4532

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\gewos.exe

      Filesize

      36KB

      MD5

      6fc9cef2db5d10540bfba57c7522f5bb

      SHA1

      20f9fed7a6b013fecc29d8959ed45e09b0a951c8

      SHA256

      7f938d2c3f030cee13cdc4b28a975024b4e6d85a78a4cf94eb47acb067c4f69c

      SHA512

      e87a04914522e11c17a2fc9b5d496073349a2973d8ae2fd540ecd45f71806121ab53d56baa41e1dc535205bbcdaaf081c4a1d748435f7283f27bc561c574fb77

    • C:\Users\Admin\AppData\Local\Temp\gewosik.exe

      Filesize

      185B

      MD5

      bdf6cd561621d858dff770d20911cc99

      SHA1

      1b4afe623a70e57028a50a80d1cfe3231d8f143c

      SHA256

      9d6525b5f17f5daa592cea66f79a60c0dab70b5b4fbf88e2117fb20e2ea4ded7

      SHA512

      b97d13689bc75dd205655b74713055c7f63709288aa91a45ecbbd75816e1d250e92b4fc54b3e145221f5f5e7282c7aeef895b70f1a38c9a6d6400b8da4776e34

    • memory/4408-0-0x0000000002350000-0x0000000002356000-memory.dmp

      Filesize

      24KB

    • memory/4408-1-0x0000000002350000-0x0000000002356000-memory.dmp

      Filesize

      24KB

    • memory/4408-2-0x0000000000400000-0x0000000000406000-memory.dmp

      Filesize

      24KB

    • memory/4844-18-0x0000000002090000-0x0000000002096000-memory.dmp

      Filesize

      24KB