Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 06:52
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-07_db25c510831cdcf5c2ead65919fe99b1_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-07_db25c510831cdcf5c2ead65919fe99b1_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-07_db25c510831cdcf5c2ead65919fe99b1_cryptolocker.exe
-
Size
45KB
-
MD5
db25c510831cdcf5c2ead65919fe99b1
-
SHA1
0665e43a0cb82db951789d83cd397fbf915e879b
-
SHA256
da2cf8f0ddd44f3df673054154c6301d87af5945b4127db57804ca1a471ad10e
-
SHA512
9630882bf805e75f78f632c038b7521948675cacaf41bf8c1e135e6681b5c0e2eeb60755111c60a83dcec81c4138b42fb7f28341b7128958fa14cc6b72d6c3f5
-
SSDEEP
768:btB9g/WItCSsAGjX7e9N0hunrknljKrCZ:btB9g/xtCSKqf1rksrS
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation 2024-09-07_db25c510831cdcf5c2ead65919fe99b1_cryptolocker.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation gewos.exe -
Executes dropped EXE 1 IoCs
pid Process 3564 gewos.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gewos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-07_db25c510831cdcf5c2ead65919fe99b1_cryptolocker.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4276 wrote to memory of 3564 4276 2024-09-07_db25c510831cdcf5c2ead65919fe99b1_cryptolocker.exe 84 PID 4276 wrote to memory of 3564 4276 2024-09-07_db25c510831cdcf5c2ead65919fe99b1_cryptolocker.exe 84 PID 4276 wrote to memory of 3564 4276 2024-09-07_db25c510831cdcf5c2ead65919fe99b1_cryptolocker.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_db25c510831cdcf5c2ead65919fe99b1_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-07_db25c510831cdcf5c2ead65919fe99b1_cryptolocker.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\gewos.exe"C:\Users\Admin\AppData\Local\Temp\gewos.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5c44cf2b18bcb34670731d52ba2dd8c35
SHA1234c20137d3e6ecf619c289c05c9525719d1a4fc
SHA256c6e6c00a0ea01a109820c0ca70531670b76b84a9d3c5ad111e40cb0d03e45d26
SHA512b2bb7179e3c1c5e88034ffd2eab0f750c437ad7457b7987336db6d691a1a24430fcd943270027a0a9d2dc9936e8a59c0b84bdc602d9cfdbfcf6e01ad06d9df25
-
Filesize
184B
MD5bfe1b02959492484fdfafd09ef7ae40f
SHA144b0b9452c05c4dc4517603a8ce331463b3cac77
SHA25601ec08bf13a0242907f5765bf481aa2cffac0b01a9a82a8419762618d8f05a98
SHA5120bdd62f264a2d97520509f0afc58f3c88c368709cf88b477fa75d674b6224ad2758d7827a8bca4136d2861c5b96505889e527ce5ddfe5c0feeb676f634bd42d5