Analysis
-
max time kernel
139s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 10:04
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-31_c85d20f02403dca176bea960ef97e0a7_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-31_c85d20f02403dca176bea960ef97e0a7_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-31_c85d20f02403dca176bea960ef97e0a7_cryptolocker.exe
-
Size
37KB
-
MD5
c85d20f02403dca176bea960ef97e0a7
-
SHA1
cd1e65a0bc2f687e3c9e969a06b56a45efc10198
-
SHA256
59b570f03b00fc2e9d80940ddeb08359b0123db62996c3c36cd2eeca9b4ddda5
-
SHA512
6aedd24077f3f3d194f1fe4dc440a2b19afa1f0b14d410613eb77cd1db173eca8167d88b37ad1bd4b8160c8d362f184dd4f715c5588916c8d4053757ab80475a
-
SSDEEP
384:btBYQg/WIEhUCSNyepEjYnDOAlzVol6U/zzo+tkq4XDIwNiJXxXunRSyV:btB9g/WItCSsAGjX7e9N0hunRvV
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x000700000002328e-12.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 2024-05-31_c85d20f02403dca176bea960ef97e0a7_cryptolocker.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation gewos.exe -
Executes dropped EXE 1 IoCs
pid Process 2092 gewos.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3808 wrote to memory of 2092 3808 2024-05-31_c85d20f02403dca176bea960ef97e0a7_cryptolocker.exe 83 PID 3808 wrote to memory of 2092 3808 2024-05-31_c85d20f02403dca176bea960ef97e0a7_cryptolocker.exe 83 PID 3808 wrote to memory of 2092 3808 2024-05-31_c85d20f02403dca176bea960ef97e0a7_cryptolocker.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-31_c85d20f02403dca176bea960ef97e0a7_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-31_c85d20f02403dca176bea960ef97e0a7_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\gewos.exe"C:\Users\Admin\AppData\Local\Temp\gewos.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD540eaa80906634a1ad292ba18b92fb225
SHA1632968ff81def43f5df7965f392e898f7fd2b4ad
SHA256fa8284aa7bfdacd270ba8dc086ce203f1dca305504e5ac46a10358b68f6ff3fb
SHA512b6e58a4a6aa22f64090b3edf3eb6c2d9a163d939fbcb16b5c64aeda47d31b29b44fcf4bb1e2fc429e978eb86957b8752650b544bc7394e5b8b2e477f3435beff
-
Filesize
185B
MD5de0f92168cb9f1413f217a8944ed35eb
SHA12b12ae91712ab1cb71a6e5f06af197db6e363044
SHA256256b85314ff0a5800c98121b29fdcb3308d1bdcd101008449fcbcbd8f4523ab0
SHA51291bd229a78e816fcf7ee40012a76bb376db7faf0aabd67e44b5b01d62dd4de5d56de9204c442d93f9b8b8e872bb84e9e8051e0a3ed88cb8bbc48071af31153fc