Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2024, 12:36
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-19_a5f71ef40589d7cb6a80c45c9e83871b_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-19_a5f71ef40589d7cb6a80c45c9e83871b_cryptolocker.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-19_a5f71ef40589d7cb6a80c45c9e83871b_cryptolocker.exe
-
Size
33KB
-
MD5
a5f71ef40589d7cb6a80c45c9e83871b
-
SHA1
2828e4835bf9b9c7131b3686cd3a5efd29e95bf3
-
SHA256
c6a103fe9eb0d3f34e228ae70418030eaf2a9f40d95ed9c73eaa3d1f2fa5723a
-
SHA512
be72592700dbc3b9c8ef2d5cf6b9292f245e4e3415f6cd23f58570f159917d9b430b8913649f2df012aed526cee7f07384f857d627029a160a2f520deb572f6f
-
SSDEEP
384:bAvMaNGh4z7CG3POOvbRSLoF/F0QU5XYFnufc/zzogFzpjufAq18st8B9:bAvJCYOOvbRPDEgXVFzpCYVb
Malware Config
Signatures
-
Detection of CryptoLocker Variants 2 IoCs
resource yara_rule behavioral2/files/0x000400000001e630-12.dat CryptoLocker_rule2 behavioral2/files/0x000400000001e630-16.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 2024-01-19_a5f71ef40589d7cb6a80c45c9e83871b_cryptolocker.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation demka.exe -
Executes dropped EXE 1 IoCs
pid Process 2004 demka.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3824 wrote to memory of 2004 3824 2024-01-19_a5f71ef40589d7cb6a80c45c9e83871b_cryptolocker.exe 25 PID 3824 wrote to memory of 2004 3824 2024-01-19_a5f71ef40589d7cb6a80c45c9e83871b_cryptolocker.exe 25 PID 3824 wrote to memory of 2004 3824 2024-01-19_a5f71ef40589d7cb6a80c45c9e83871b_cryptolocker.exe 25
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-19_a5f71ef40589d7cb6a80c45c9e83871b_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-19_a5f71ef40589d7cb6a80c45c9e83871b_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\demka.exe"C:\Users\Admin\AppData\Local\Temp\demka.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:2004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5abd7c5675d783771eb7df114c00b0146
SHA1f831c9b1c4c47531566b3a44354c2ab802289354
SHA2563ef395dbb4ae08423c3864fb2596004688e0731624c3f4b093f2392f50ba5acb
SHA5120609fc7c556d23b6fed1b2ed2c9a75e53a8e0f6f8fadbef4b91cb988f2ada451a60bbded674a97228a9ad12fec6572d2dda2f9f21edb0ce4e3e30b01cd3358fd
-
Filesize
33KB
MD5dcb845863a77db6d2fbac1cce1b63fef
SHA173df1538849b61f354819827c5c1ea0666570517
SHA2561c5362bf2396f903a4d9be7053ed18e150e98d1860601efaccd320e7567de8be
SHA512efe27e9b5877c6d4ff43e4af96f8e12ac84fca6c6f7373100a62743a74a085c885c403b00a681bdfd3805be33e5855dd812d5e53206e8144af9a7d94ade30b30