Analysis
-
max time kernel
93s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 03:22
Behavioral task
behavioral1
Sample
2024-09-12_052ea9cbfbde199402e4ed7eb7abf884_cryptolocker.exe
Resource
win7-20240708-en
General
-
Target
2024-09-12_052ea9cbfbde199402e4ed7eb7abf884_cryptolocker.exe
-
Size
58KB
-
MD5
052ea9cbfbde199402e4ed7eb7abf884
-
SHA1
48ff4e4d0dbc9aa4903db4f2b367b5ac0665308a
-
SHA256
3354a132ee98572c71798194de12cf37d9be8c0fc1f79ff058907c5d85557b60
-
SHA512
ba6e54abe0b70204b3cdb7498d1ed2cb439539b21615861597ef0227b997f7bf365121d6462e02b0a991c581198e8240b2f58d39e989281925560d1af53b9e58
-
SSDEEP
768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlgcS7:bP9g/xtCS3Dxx0X
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation 2024-09-12_052ea9cbfbde199402e4ed7eb7abf884_cryptolocker.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation gewos.exe -
Executes dropped EXE 1 IoCs
pid Process 3376 gewos.exe -
resource yara_rule behavioral2/memory/4928-0-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/files/0x0009000000023420-13.dat upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-12_052ea9cbfbde199402e4ed7eb7abf884_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gewos.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4928 wrote to memory of 3376 4928 2024-09-12_052ea9cbfbde199402e4ed7eb7abf884_cryptolocker.exe 85 PID 4928 wrote to memory of 3376 4928 2024-09-12_052ea9cbfbde199402e4ed7eb7abf884_cryptolocker.exe 85 PID 4928 wrote to memory of 3376 4928 2024-09-12_052ea9cbfbde199402e4ed7eb7abf884_cryptolocker.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-12_052ea9cbfbde199402e4ed7eb7abf884_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-12_052ea9cbfbde199402e4ed7eb7abf884_cryptolocker.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\gewos.exe"C:\Users\Admin\AppData\Local\Temp\gewos.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD549437dec4deef2cfe4b5cbd25701b6b5
SHA13177817fb215b72bb4d409cf0cb897004a96d2de
SHA2563835c4a85e8c17ecd8efb413cc2e77d752a36db31a129ad4383dfcb5a0e2eb5f
SHA5128368822b5a397b9bea03d4eb7cc86e34a13734f65684d5c38b1cc1a9e6ae33b62273d4e694be1949e2ac828720be1669d626f7e8a973a06393bd8e727e272571
-
Filesize
184B
MD5af4070636db5fe36aea9edc6bb5a2e0c
SHA1e8f044c749440916c6b44f192241195732b4993d
SHA256f86a4d649940e4b111f04fe4f51cd58a173ecace3adc35a3c4feafdfe143a3fe
SHA512985af5253b2ef1798d0c84835948d34150c7d59dfbd677e9fdd454d7fb56eccc76a5fa94abef6402862f82f26e38ec3f410105c89d5df2c01e22f62df8de51b6