Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-11-2024 06:27

General

  • Target

    2024-11-02_bfb51dc5702b9e40678b0a7e920ba22e_cryptolocker.exe

  • Size

    36KB

  • MD5

    bfb51dc5702b9e40678b0a7e920ba22e

  • SHA1

    7e133820cdae50162710f41c807d08ac5ab02d2a

  • SHA256

    f6c021913201342fbeb88ae6242494541392995734dca641bc6bf0ba47872801

  • SHA512

    7f0e33ad810a28733d2aa39a34632483c048abec01ca8a90061ba88006470751c1c185c4660720e79a600697366e47b8d99ff2166d0dc51a3fd46029ad5b61d8

  • SSDEEP

    768:b7o/2n1TCraU6GD1a4Xt9bRU6zA6oTy4l:bc/y2lLRU6zA6cx

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-11-02_bfb51dc5702b9e40678b0a7e920ba22e_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-11-02_bfb51dc5702b9e40678b0a7e920ba22e_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2880
    • C:\Users\Admin\AppData\Local\Temp\rewok.exe
      "C:\Users\Admin\AppData\Local\Temp\rewok.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rewok.exe

    Filesize

    36KB

    MD5

    2eb986911f69594d31863fe0b40c9f7d

    SHA1

    28c294f21c531f7f4c278227450a859eb005bd50

    SHA256

    df4513e54d2a049fea9ed475d294a05e745383e95e96497de1878d9a1bb0b89c

    SHA512

    73f534c061d5ade15318e712b52e147fe0c1c9ab6ab7cc7c2dd2c1457a97c2f25ba9faa72f27d1785aaf938cd9533e51d7e48d028ff138d85d24eef65880aa0c

  • memory/1080-25-0x0000000002110000-0x0000000002116000-memory.dmp

    Filesize

    24KB

  • memory/2880-0-0x00000000021C0000-0x00000000021C6000-memory.dmp

    Filesize

    24KB

  • memory/2880-1-0x00000000021C0000-0x00000000021C6000-memory.dmp

    Filesize

    24KB

  • memory/2880-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB