Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-06-2024 21:35

General

  • Target

    2024-06-04_747f36edea9e79cb2dfc463704584789_cryptolocker.exe

  • Size

    39KB

  • MD5

    747f36edea9e79cb2dfc463704584789

  • SHA1

    b870c323c432d26b2095ccd023d0ce0cb8ed81d1

  • SHA256

    64405c8e79d772e57cd11e842c6c472b1163f0bcaa9e6c6c77ddb6ef95d0f24c

  • SHA512

    ebebb202ae5ee5b5585c99b9011bf29c2bc92f536687a8e3bc275a36ce4dd7a679792781f93a02ad2c4213b1582235de66dedf1946ba383678596fd5c3689b66

  • SSDEEP

    768:b7o/2n1TCraU6GD1a4Xt9bRU6zA6o36mh02:bc/y2lLRU6zA6qe2

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-04_747f36edea9e79cb2dfc463704584789_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-04_747f36edea9e79cb2dfc463704584789_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:5040
    • C:\Users\Admin\AppData\Local\Temp\rewok.exe
      "C:\Users\Admin\AppData\Local\Temp\rewok.exe"
      2⤵
      • Executes dropped EXE
      PID:2944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rewok.exe

    Filesize

    39KB

    MD5

    6e48e432112dce134482bf88898688bb

    SHA1

    2511e6625129dfad6e2720c9699ac23073b3d9db

    SHA256

    17865d988a2abd9e5297c6c671b59bf9435622cb80c63cfa40c8bd19bafac277

    SHA512

    ae1c9865583d3657c1961fc6d44dd080d4118caee26794cb92a5c5b288808ebaa8abccba7f545452932357b36474f5ca1f17a3c062558e0d3b1af0211d5861cb

  • memory/2944-25-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/5040-0-0x0000000002350000-0x0000000002356000-memory.dmp

    Filesize

    24KB

  • memory/5040-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/5040-8-0x0000000002350000-0x0000000002356000-memory.dmp

    Filesize

    24KB