Analysis

  • max time kernel
    143s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/01/2024, 12:36

General

  • Target

    2024-01-19_a5f71ef40589d7cb6a80c45c9e83871b_cryptolocker.exe

  • Size

    33KB

  • MD5

    a5f71ef40589d7cb6a80c45c9e83871b

  • SHA1

    2828e4835bf9b9c7131b3686cd3a5efd29e95bf3

  • SHA256

    c6a103fe9eb0d3f34e228ae70418030eaf2a9f40d95ed9c73eaa3d1f2fa5723a

  • SHA512

    be72592700dbc3b9c8ef2d5cf6b9292f245e4e3415f6cd23f58570f159917d9b430b8913649f2df012aed526cee7f07384f857d627029a160a2f520deb572f6f

  • SSDEEP

    384:bAvMaNGh4z7CG3POOvbRSLoF/F0QU5XYFnufc/zzogFzpjufAq18st8B9:bAvJCYOOvbRPDEgXVFzpCYVb

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-19_a5f71ef40589d7cb6a80c45c9e83871b_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-19_a5f71ef40589d7cb6a80c45c9e83871b_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3824
    • C:\Users\Admin\AppData\Local\Temp\demka.exe
      "C:\Users\Admin\AppData\Local\Temp\demka.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:2004

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\demka.exe

          Filesize

          9KB

          MD5

          abd7c5675d783771eb7df114c00b0146

          SHA1

          f831c9b1c4c47531566b3a44354c2ab802289354

          SHA256

          3ef395dbb4ae08423c3864fb2596004688e0731624c3f4b093f2392f50ba5acb

          SHA512

          0609fc7c556d23b6fed1b2ed2c9a75e53a8e0f6f8fadbef4b91cb988f2ada451a60bbded674a97228a9ad12fec6572d2dda2f9f21edb0ce4e3e30b01cd3358fd

        • C:\Users\Admin\AppData\Local\Temp\demka.exe

          Filesize

          33KB

          MD5

          dcb845863a77db6d2fbac1cce1b63fef

          SHA1

          73df1538849b61f354819827c5c1ea0666570517

          SHA256

          1c5362bf2396f903a4d9be7053ed18e150e98d1860601efaccd320e7567de8be

          SHA512

          efe27e9b5877c6d4ff43e4af96f8e12ac84fca6c6f7373100a62743a74a085c885c403b00a681bdfd3805be33e5855dd812d5e53206e8144af9a7d94ade30b30

        • memory/2004-25-0x0000000002D60000-0x0000000002D66000-memory.dmp

          Filesize

          24KB

        • memory/3824-0-0x0000000002260000-0x0000000002266000-memory.dmp

          Filesize

          24KB

        • memory/3824-2-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/3824-1-0x0000000002260000-0x0000000002266000-memory.dmp

          Filesize

          24KB