Analysis

  • max time kernel
    104s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/03/2025, 08:04

General

  • Target

    2025-03-21_c27dcd15aedc2d37e074bd56575625c1_cryptolocker.exe

  • Size

    61KB

  • MD5

    c27dcd15aedc2d37e074bd56575625c1

  • SHA1

    cdbfba65bf8443781f7422440c2bdc80ca725940

  • SHA256

    a875b37040f21491a8d65e49f92a156b13f1d14e6c601f79d18188debadcdc5d

  • SHA512

    b7b17daefeb321db69e0bb277225b23f2d42abc9f2c6e06e633643a60cba18469544c18ee237b9357580c12a8560f4d9c735098eea01f4fc9087881693eb1400

  • SSDEEP

    768:bYv9g/WItCSsAGmXWhaI9cZnIe9N0hunrknljKrCY1a:bYv9g/xtCSDx6A7f1rksrx1a

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-03-21_c27dcd15aedc2d37e074bd56575625c1_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-03-21_c27dcd15aedc2d37e074bd56575625c1_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5812
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\gewos.exe

    Filesize

    61KB

    MD5

    222166c81b7629186de32ed8d0b8745f

    SHA1

    519723afe1bfb897ed89c4645705681a38b69899

    SHA256

    a4082c8d7b1ad2c4e0306224efa803ae0b62e530a02f5a158b4d88cf003d5b9d

    SHA512

    0a668cf5264f8f694d907b1faff4640d00f83bfb9e727664b09055fd819296d51dee254a947e0d1dfbb09490632cd19983b5a662774229d2deb52c538c5d64ac

  • C:\Users\Admin\AppData\Local\Temp\gewosik.exe

    Filesize

    185B

    MD5

    3ea7614da1c77e333855890317969501

    SHA1

    822489531beb32e368b61c41880526efc931922a

    SHA256

    4e7b906cd7fc5af1f1b71212da537b442aa2abd5ccad286ec705b5bed08b40b4

    SHA512

    21d8d8dbbd94a0ebddb6769162e56d9533c91656fa022a416b0d5a1c217d723ebdd1f8bdee6148a9b72ebe1f9c1ae44df96925b9551b1878b5784da05f7cf69f

  • memory/2660-25-0x0000000002090000-0x0000000002096000-memory.dmp

    Filesize

    24KB

  • memory/5812-0-0x0000000000620000-0x0000000000626000-memory.dmp

    Filesize

    24KB

  • memory/5812-1-0x0000000000620000-0x0000000000626000-memory.dmp

    Filesize

    24KB

  • memory/5812-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB