Analysis

  • max time kernel
    93s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/05/2024, 15:27

General

  • Target

    2024-05-29_332b29210b7659f23979f28b30fcfde5_cryptolocker.exe

  • Size

    38KB

  • MD5

    332b29210b7659f23979f28b30fcfde5

  • SHA1

    d1759ca1c48f7f26fb6f46298a618f7dfc5e3cd5

  • SHA256

    69d1102192203a7eb8e7d290088a79af0a3f23b2b4a9af7d00f305414eebd9aa

  • SHA512

    5fdc7c925b4bfcff4402c70e0b1bf180d33dc6ee222a391e77b224d24b3eea3467bfafa0c56ab121157fd4c9b1776c2198a31bbf4ba63acb42bc4412b00d9f01

  • SSDEEP

    384:btBYQg/WIEhUCSNyepEjYnDOAlzVol6U/zzo+tkq4XDIwNiJXxXunRSy3R:btB9g/WItCSsAGjX7e9N0hunRvB

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-29_332b29210b7659f23979f28b30fcfde5_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-29_332b29210b7659f23979f28b30fcfde5_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1544
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:3476

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\gewos.exe

    Filesize

    38KB

    MD5

    73bc38f7679d250b34d33a09f1963377

    SHA1

    d4d4e310fd6b13d87489127d635e9622d7668377

    SHA256

    ef88c0a2b56dece2bb72d998ba56317a440e2ef03e99c425bdd0a6de0fddb0c5

    SHA512

    4a81e75277fac5e5a0444dd59934d54b8a6e68e584d6c51b92f89d3137671dbdf7f78ac59890eed13d9db5e0004b0c0a4a5dc3d228c6cda752f611dde86c486b

  • C:\Users\Admin\AppData\Local\Temp\gewosik.exe

    Filesize

    185B

    MD5

    7ca85abf231838c2ec9b163cba3c4273

    SHA1

    a75020361f7ac6e7163ec94d11e6d39cb63d6e20

    SHA256

    ab3ee3007f85f3aa1e68b3cce845daef049029d3425f1db8afd979e6b36a7c09

    SHA512

    a2219d64ae51632a9cc2da69d6425dff095b53401e97f834a62dd6dc624f3effb0984f3fe7063907c191fa019279964c4686a47896fbaef08577e2e6ec180109

  • memory/1544-0-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/1544-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/1544-7-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/3476-25-0x00000000020F0000-0x00000000020F6000-memory.dmp

    Filesize

    24KB