Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-05-2024 00:31

General

  • Target

    2024-05-29_7e6c5ed9104a5ab083c35fe2a20817a3_cryptolocker.exe

  • Size

    38KB

  • MD5

    7e6c5ed9104a5ab083c35fe2a20817a3

  • SHA1

    b24a4a47123ef7da1f73e84ad057691b05932ac2

  • SHA256

    41a62e941af4fcffcbc54374564e19fa7af55c8cd47eb178b1cf0a0903934e6b

  • SHA512

    ccc32c5e65fd46ae097e2db0b16c4bf692892bd1ddb5ead746c4c11c35c4daf3ef0cd0b68ab4bd1c7309c8a1e1446518f7012e7d846bd6e254d5b31c5d5d3689

  • SSDEEP

    768:b7o/2n1TCraU6GD1a4Xt9bRU6zA6o36mhI:bc/y2lLRU6zA6qa

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-29_7e6c5ed9104a5ab083c35fe2a20817a3_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-29_7e6c5ed9104a5ab083c35fe2a20817a3_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4976
    • C:\Users\Admin\AppData\Local\Temp\rewok.exe
      "C:\Users\Admin\AppData\Local\Temp\rewok.exe"
      2⤵
      • Executes dropped EXE
      PID:5064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rewok.exe

    Filesize

    38KB

    MD5

    7a20591a2749e4fdb0315eb26e3f003e

    SHA1

    a93d57333b326f00df46325b39b0c139af241a2b

    SHA256

    7160e020184116915e041ff9e05076c959ac4297b6f57b0bbe4a5ccba1324de7

    SHA512

    ec35943db7696c0574def04cf9a8a593814bc9d921bdb3e73da8ad840e99daa7c2c8260a38b3adf5ebad539fc27cf5020a557f1490a9a39b769fbb9f7697230d

  • memory/4976-0-0x0000000002010000-0x0000000002016000-memory.dmp

    Filesize

    24KB

  • memory/4976-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/4976-1-0x0000000002010000-0x0000000002016000-memory.dmp

    Filesize

    24KB

  • memory/5064-25-0x0000000002120000-0x0000000002126000-memory.dmp

    Filesize

    24KB