Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/09/2024, 06:52

General

  • Target

    2024-09-07_db25c510831cdcf5c2ead65919fe99b1_cryptolocker.exe

  • Size

    45KB

  • MD5

    db25c510831cdcf5c2ead65919fe99b1

  • SHA1

    0665e43a0cb82db951789d83cd397fbf915e879b

  • SHA256

    da2cf8f0ddd44f3df673054154c6301d87af5945b4127db57804ca1a471ad10e

  • SHA512

    9630882bf805e75f78f632c038b7521948675cacaf41bf8c1e135e6681b5c0e2eeb60755111c60a83dcec81c4138b42fb7f28341b7128958fa14cc6b72d6c3f5

  • SSDEEP

    768:btB9g/WItCSsAGjX7e9N0hunrknljKrCZ:btB9g/xtCSKqf1rksrS

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-07_db25c510831cdcf5c2ead65919fe99b1_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-07_db25c510831cdcf5c2ead65919fe99b1_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4276
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3564

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\gewos.exe

          Filesize

          45KB

          MD5

          c44cf2b18bcb34670731d52ba2dd8c35

          SHA1

          234c20137d3e6ecf619c289c05c9525719d1a4fc

          SHA256

          c6e6c00a0ea01a109820c0ca70531670b76b84a9d3c5ad111e40cb0d03e45d26

          SHA512

          b2bb7179e3c1c5e88034ffd2eab0f750c437ad7457b7987336db6d691a1a24430fcd943270027a0a9d2dc9936e8a59c0b84bdc602d9cfdbfcf6e01ad06d9df25

        • C:\Users\Admin\AppData\Local\Temp\gewosik.exe

          Filesize

          184B

          MD5

          bfe1b02959492484fdfafd09ef7ae40f

          SHA1

          44b0b9452c05c4dc4517603a8ce331463b3cac77

          SHA256

          01ec08bf13a0242907f5765bf481aa2cffac0b01a9a82a8419762618d8f05a98

          SHA512

          0bdd62f264a2d97520509f0afc58f3c88c368709cf88b477fa75d674b6224ad2758d7827a8bca4136d2861c5b96505889e527ce5ddfe5c0feeb676f634bd42d5

        • memory/3564-25-0x0000000002210000-0x0000000002216000-memory.dmp

          Filesize

          24KB

        • memory/4276-0-0x00000000021D0000-0x00000000021D6000-memory.dmp

          Filesize

          24KB

        • memory/4276-1-0x00000000021D0000-0x00000000021D6000-memory.dmp

          Filesize

          24KB

        • memory/4276-2-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB