Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 14:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-19_6582620fdedb8e663f032d0fa7fb2763_cryptolocker.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-19_6582620fdedb8e663f032d0fa7fb2763_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-19_6582620fdedb8e663f032d0fa7fb2763_cryptolocker.exe
-
Size
34KB
-
MD5
6582620fdedb8e663f032d0fa7fb2763
-
SHA1
95914df6778ed0b005705c5074c562dd69195730
-
SHA256
bc467f00945a78f3b3c164a4d8696766763ba22cb71313f08c1a4c1ff8f297fa
-
SHA512
c4638f6ad736e51e19284dedc59398d87a962ca796bc83e9ae040de695355a17ddf63716784d7d7deed6e5aa2a45cbd87916cce216d8d5c864b7d1270ff94b3c
-
SSDEEP
384:btBYQg/WIEhUCSNyepEjYnDOAlzVol6U/zzo+tkq4XDIwNiA0h:btB9g/WItCSsAGjX7e9N2
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation 2024-09-19_6582620fdedb8e663f032d0fa7fb2763_cryptolocker.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation gewos.exe -
Executes dropped EXE 1 IoCs
pid Process 4680 gewos.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-19_6582620fdedb8e663f032d0fa7fb2763_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gewos.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4000 wrote to memory of 4680 4000 2024-09-19_6582620fdedb8e663f032d0fa7fb2763_cryptolocker.exe 82 PID 4000 wrote to memory of 4680 4000 2024-09-19_6582620fdedb8e663f032d0fa7fb2763_cryptolocker.exe 82 PID 4000 wrote to memory of 4680 4000 2024-09-19_6582620fdedb8e663f032d0fa7fb2763_cryptolocker.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-19_6582620fdedb8e663f032d0fa7fb2763_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-19_6582620fdedb8e663f032d0fa7fb2763_cryptolocker.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\gewos.exe"C:\Users\Admin\AppData\Local\Temp\gewos.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5c0de0ae59ab4aa1ed4b599d3c111e899
SHA1714600ab4f2297499a7b4bf8764e8b07f32b7257
SHA256fde427515ae1ed1dc757bb75c9448f76650577b429f093a796e66593bc7ab17a
SHA512e41975e654beaf6d14bd1fed11c9ea0aa3b175f7d97387ef685ecb88ff9f9facd588784919c0c0cf7e3715a4440fe3ad57bedf57ce54f095b695582f43651a44
-
Filesize
184B
MD57a48fe67c630615cb4d7fb9fc491f8b0
SHA1930d573ee3dbe62524ace1c5755ce45ba90dcb3b
SHA256bbc82b607662e86ed15b10f08009800f096a5d23b41a0a124542335ad4d14033
SHA5124e7a8cb42c351ea8f4b2003f79ad1e8fec82274b448060459662a7c22803b7ab2f33a8e54af3250b4c8d86f828c52207b1807a0e074401488ea320a2bc66f9dd