Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/10/2024, 04:22

General

  • Target

    2024-10-15_021b06f66612842e0b7847934a07ca79_cryptolocker.exe

  • Size

    37KB

  • MD5

    021b06f66612842e0b7847934a07ca79

  • SHA1

    4c9569423dc60f2b8754cdc7a361229ce5ddad21

  • SHA256

    1bbe85bf48fb294ca159d2180ca996948d6ebee0cfbe85831bcca0ed72c6860c

  • SHA512

    17d8f459d4226ff9162efbb00bc4c86de71cb256025965ab6fe496fb16356e2a6667956db655149fa1675587ef571b79d1f486bba098af36782a9acf8eefe04e

  • SSDEEP

    768:b7o/2n1TCraU6GD1a4Xt9bRU6zA6o36mIx:bc/y2lLRU6zA6qK

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-15_021b06f66612842e0b7847934a07ca79_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-15_021b06f66612842e0b7847934a07ca79_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5060
    • C:\Users\Admin\AppData\Local\Temp\rewok.exe
      "C:\Users\Admin\AppData\Local\Temp\rewok.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3124

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rewok.exe

    Filesize

    37KB

    MD5

    6c0edad9eba586bf001b636ee4959493

    SHA1

    813ad05df581cab1814b6518e22dfbbc510748f3

    SHA256

    034af8a1978fae7bc0d643e67d3c78ff360684a73d5ecd0f3fb6f72514d2d866

    SHA512

    0dc053de294f1f1a30221adac7cf41774728921f0073632bf1e1895681f0ee8fe9ca651854428581a6094a2fc90d87f4886eb07e84eadc0977ceb96a1337668e

  • memory/3124-19-0x0000000002120000-0x0000000002126000-memory.dmp

    Filesize

    24KB

  • memory/5060-1-0x0000000002350000-0x0000000002356000-memory.dmp

    Filesize

    24KB

  • memory/5060-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/5060-0-0x0000000002350000-0x0000000002356000-memory.dmp

    Filesize

    24KB