Analysis

  • max time kernel
    145s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-01-2024 01:28

General

  • Target

    2024-01-25_5670267779b14c549e3a4ff8a2dae8f4_cryptolocker.exe

  • Size

    30KB

  • MD5

    5670267779b14c549e3a4ff8a2dae8f4

  • SHA1

    0d62ad6264a70189451b1e2487f177d225cbeb69

  • SHA256

    5b8fd29e41b3cdd5b511e90555decdac03973714e02bbd7e8140287dbb958bae

  • SHA512

    9f41b2b3c65aec3c9f0c55185ecd94dc21a2611df9f9f72a46ffab640167116d0a8bd0469f32725630522e0de711049f72138b891dd248b1e98ffddb111a766a

  • SSDEEP

    384:bAvMaNGh4z7CG3POOvbRSLoF/F0QU5XYFnufc/zzo6cuM3:bAvJCYOOvbRPDEgXRcuM3

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-25_5670267779b14c549e3a4ff8a2dae8f4_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-25_5670267779b14c549e3a4ff8a2dae8f4_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2572
    • C:\Users\Admin\AppData\Local\Temp\demka.exe
      "C:\Users\Admin\AppData\Local\Temp\demka.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:440

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\demka.exe

    Filesize

    31KB

    MD5

    4b254bbde156f0cdef192bca8e47cd6d

    SHA1

    30b3d825ff5ccc2d826825338c045df98674d842

    SHA256

    ebc696223970005b3059ce00d54e6cde48434c629bfdc5fd1789863e33dfd98e

    SHA512

    89330b6e6c237d486192346600115c65f422d218a09f9dc73604fae92db8a2f5943a27ddfab6051dda3e35c75171125a2bd89386692cff2f5d42b39da908da10

  • memory/440-21-0x0000000000600000-0x0000000000606000-memory.dmp

    Filesize

    24KB

  • memory/2572-0-0x0000000000740000-0x0000000000746000-memory.dmp

    Filesize

    24KB

  • memory/2572-1-0x0000000000740000-0x0000000000746000-memory.dmp

    Filesize

    24KB

  • memory/2572-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB