Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 02:28
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-28_6ce96cb6585b0b8679e6d910c4ee6ef1_cryptolocker.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-28_6ce96cb6585b0b8679e6d910c4ee6ef1_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-28_6ce96cb6585b0b8679e6d910c4ee6ef1_cryptolocker.exe
-
Size
33KB
-
MD5
6ce96cb6585b0b8679e6d910c4ee6ef1
-
SHA1
8ba3d093038ba081a7932b7c06dda71a6b65f0f1
-
SHA256
cdefc730452fe0df898cf669aade520558da9cb4d961cf6bb69cbb0114c76529
-
SHA512
40f6a6de57adec82bb67bbf27606f840b4570651ec04d5643ab4361e6b805d49ea8521b18bb4bed03706b71f254af674bc3e6862e9012b19dd9c98a9fc01409f
-
SSDEEP
384:btBYQg/WIEhUCSNyepEjYnDOAlzVol6U/zzo+tkq4XDIwNwB6Usa:btB9g/WItCSsAGjX7e9NKN
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation 2024-09-28_6ce96cb6585b0b8679e6d910c4ee6ef1_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 2904 gewos.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-28_6ce96cb6585b0b8679e6d910c4ee6ef1_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gewos.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4916 wrote to memory of 2904 4916 2024-09-28_6ce96cb6585b0b8679e6d910c4ee6ef1_cryptolocker.exe 83 PID 4916 wrote to memory of 2904 4916 2024-09-28_6ce96cb6585b0b8679e6d910c4ee6ef1_cryptolocker.exe 83 PID 4916 wrote to memory of 2904 4916 2024-09-28_6ce96cb6585b0b8679e6d910c4ee6ef1_cryptolocker.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-28_6ce96cb6585b0b8679e6d910c4ee6ef1_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-28_6ce96cb6585b0b8679e6d910c4ee6ef1_cryptolocker.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\gewos.exe"C:\Users\Admin\AppData\Local\Temp\gewos.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD55da0dfe2a21995fa4c4a910308fd64f2
SHA1c85d73aa2e4da998f1bf26a8fd79a8e259ed2028
SHA256f6ad359992a93faccd8a2f5f151d2ae51bde3a44605d2c4a32a31e59765bc601
SHA512eff33ee9ff6b657675a77bb2490204fd17100279b108a71bc63655a551ca4cab611f6b9b25b6b3cede50b1f394c87fab3d8071773c2f68683e9a1dfc820ebab4