Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2024 05:59
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-09_adcf2315f8b460e1988bf5f49bf26b2f_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-09_adcf2315f8b460e1988bf5f49bf26b2f_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-09_adcf2315f8b460e1988bf5f49bf26b2f_cryptolocker.exe
-
Size
34KB
-
MD5
adcf2315f8b460e1988bf5f49bf26b2f
-
SHA1
2c9d5e2532fe954fb752cc00b4e5f6a0fc08d872
-
SHA256
88e11fcc6ec15c592db95fbd7d0005675041fb5c9a3770e86a62f38c3d4a2c94
-
SHA512
6a2ff6e10fbec357b84cf3ee80a43caf2d8f4311d7dd50749c222e469d521105102cb3f1dbcd99023c3639ef81af84d9bcd3dd7baa3aa7c811f9b4c8d8b89b74
-
SSDEEP
384:bAvMaNGh4z7CG3POOvbRSLoF/F0QU5XYFnufc/zzogFzpjufAq18st8O:bAvJCYOOvbRPDEgXVFzpCYVe
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation 2024-01-09_adcf2315f8b460e1988bf5f49bf26b2f_cryptolocker.exe Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation demka.exe -
Executes dropped EXE 1 IoCs
pid Process 4492 demka.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3412 wrote to memory of 4492 3412 2024-01-09_adcf2315f8b460e1988bf5f49bf26b2f_cryptolocker.exe 91 PID 3412 wrote to memory of 4492 3412 2024-01-09_adcf2315f8b460e1988bf5f49bf26b2f_cryptolocker.exe 91 PID 3412 wrote to memory of 4492 3412 2024-01-09_adcf2315f8b460e1988bf5f49bf26b2f_cryptolocker.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-09_adcf2315f8b460e1988bf5f49bf26b2f_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-09_adcf2315f8b460e1988bf5f49bf26b2f_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\demka.exe"C:\Users\Admin\AppData\Local\Temp\demka.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:4492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD59cd008f067fb6593b3eae5d5d346a3b0
SHA10c08cdb16f604b0050f9dab3c5b79bface209244
SHA25637e7d18ffe7457c76ba9f385201f9b08e8bd952adbc410d9ed1899d27cbae565
SHA512c75f24d978e989c3261d9d44391a897a61253e30d02bdc64c70005afa09dcb56d2963674bf4d3728ca9453f4dede14c3afa3c3692405bdf2b6cb70e417c36d29