Analysis
-
max time kernel
93s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 15:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-29_332b29210b7659f23979f28b30fcfde5_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-29_332b29210b7659f23979f28b30fcfde5_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-29_332b29210b7659f23979f28b30fcfde5_cryptolocker.exe
-
Size
38KB
-
MD5
332b29210b7659f23979f28b30fcfde5
-
SHA1
d1759ca1c48f7f26fb6f46298a618f7dfc5e3cd5
-
SHA256
69d1102192203a7eb8e7d290088a79af0a3f23b2b4a9af7d00f305414eebd9aa
-
SHA512
5fdc7c925b4bfcff4402c70e0b1bf180d33dc6ee222a391e77b224d24b3eea3467bfafa0c56ab121157fd4c9b1776c2198a31bbf4ba63acb42bc4412b00d9f01
-
SSDEEP
384:btBYQg/WIEhUCSNyepEjYnDOAlzVol6U/zzo+tkq4XDIwNiJXxXunRSy3R:btB9g/WItCSsAGjX7e9N0hunRvB
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x000600000002327c-12.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation 2024-05-29_332b29210b7659f23979f28b30fcfde5_cryptolocker.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation gewos.exe -
Executes dropped EXE 1 IoCs
pid Process 3476 gewos.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1544 wrote to memory of 3476 1544 2024-05-29_332b29210b7659f23979f28b30fcfde5_cryptolocker.exe 82 PID 1544 wrote to memory of 3476 1544 2024-05-29_332b29210b7659f23979f28b30fcfde5_cryptolocker.exe 82 PID 1544 wrote to memory of 3476 1544 2024-05-29_332b29210b7659f23979f28b30fcfde5_cryptolocker.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-29_332b29210b7659f23979f28b30fcfde5_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-29_332b29210b7659f23979f28b30fcfde5_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\gewos.exe"C:\Users\Admin\AppData\Local\Temp\gewos.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:3476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD573bc38f7679d250b34d33a09f1963377
SHA1d4d4e310fd6b13d87489127d635e9622d7668377
SHA256ef88c0a2b56dece2bb72d998ba56317a440e2ef03e99c425bdd0a6de0fddb0c5
SHA5124a81e75277fac5e5a0444dd59934d54b8a6e68e584d6c51b92f89d3137671dbdf7f78ac59890eed13d9db5e0004b0c0a4a5dc3d228c6cda752f611dde86c486b
-
Filesize
185B
MD57ca85abf231838c2ec9b163cba3c4273
SHA1a75020361f7ac6e7163ec94d11e6d39cb63d6e20
SHA256ab3ee3007f85f3aa1e68b3cce845daef049029d3425f1db8afd979e6b36a7c09
SHA512a2219d64ae51632a9cc2da69d6425dff095b53401e97f834a62dd6dc624f3effb0984f3fe7063907c191fa019279964c4686a47896fbaef08577e2e6ec180109