Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 05:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-21_bca189f367c846c218012c328f1d37a5_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-21_bca189f367c846c218012c328f1d37a5_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-21_bca189f367c846c218012c328f1d37a5_cryptolocker.exe
-
Size
42KB
-
MD5
bca189f367c846c218012c328f1d37a5
-
SHA1
265aee9ae9e76e3b58c334904853baadcedd20a6
-
SHA256
b12a63ac85b782a4804c58f7f92761f6628e6f3bbb4a582b74bcfa0df782afc8
-
SHA512
c9b1a16186f2d3cfb676d5b3a078a7a65a557dda2eeaf6e49e7b103a14fd96acc551b79253d25b6a675f6028618dfe418495ea4ba83931fb2f55e67f007f769a
-
SSDEEP
384:btBYQg/WIEhUCSNyepEjYnDOAlzVol6U/zzo+tkq4l8tFFxE2B94IOMHo3sxP1TP:btB9g/WItCSsAGjX7r3BPOMHoc/QQJPZ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation 2024-09-21_bca189f367c846c218012c328f1d37a5_cryptolocker.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation gewos.exe -
Executes dropped EXE 1 IoCs
pid Process 4252 gewos.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-21_bca189f367c846c218012c328f1d37a5_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gewos.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4508 wrote to memory of 4252 4508 2024-09-21_bca189f367c846c218012c328f1d37a5_cryptolocker.exe 82 PID 4508 wrote to memory of 4252 4508 2024-09-21_bca189f367c846c218012c328f1d37a5_cryptolocker.exe 82 PID 4508 wrote to memory of 4252 4508 2024-09-21_bca189f367c846c218012c328f1d37a5_cryptolocker.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-21_bca189f367c846c218012c328f1d37a5_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-21_bca189f367c846c218012c328f1d37a5_cryptolocker.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\gewos.exe"C:\Users\Admin\AppData\Local\Temp\gewos.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD5c62343f112523e481e38dc2ee48a0566
SHA183871dd1fe858ed74fab4d97e89182e19d310f44
SHA25633c1607dc7c67733e918e9702cdcaf208eebe5842974d783552a39c50c5e5297
SHA5125b500cf00457fb2beb40d44efc89ca79808b168dadaaa97214496893c34167d12c4082f1fe79620a0b4b7af5fab3d85821080a26646008815a77801ed89b49fc
-
Filesize
184B
MD5c6feddfa8e7984d1772eb523d801eabe
SHA1f9ae491d9d5f99fb9cdfd8a54fde56eb49f82e40
SHA2565ec887edbbd61600a62f13732b8b434f8a401f1b90fcd8573325c0033ab786a1
SHA512aad498d4721b2ccc6bfed3549e6e7a31944b2c9a1e46faadb6ad9872837fb7b78b0eb2c441f398e06dd11f533fdb9ad3993444d936e3bbc03e347b4b94250dd0