Analysis

  • max time kernel
    89s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-02-2024 20:33

General

  • Target

    2024-02-11_7f3fc8e30adb35ca1adc9893c2b132be_cryptolocker.exe

  • Size

    33KB

  • MD5

    7f3fc8e30adb35ca1adc9893c2b132be

  • SHA1

    4b4912646b36d9916e256587911c722b85b221b8

  • SHA256

    9411c5ff8adcc8bcd5725f54e99aef652b2ffb9628e9e6bfb57c0298d8b86f0f

  • SHA512

    e636f1060afe3c8312d9cdee2536ee2d4cd42bc6b4df37628df4d7c44cdbf686821b781e5447a866bd53285cdc94926d0dc7b3e7cc6195f7f5511415baf8c26d

  • SSDEEP

    384:bAvMaNGh4z7CG3POOvbRSLoF/F0QU5XYFnufc/zzo6c3l8Sz960g:bAvJCYOOvbRPDEgXRc3SSz3g

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-11_7f3fc8e30adb35ca1adc9893c2b132be_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-11_7f3fc8e30adb35ca1adc9893c2b132be_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:640
    • C:\Users\Admin\AppData\Local\Temp\demka.exe
      "C:\Users\Admin\AppData\Local\Temp\demka.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:1060

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\demka.exe

    Filesize

    33KB

    MD5

    88cba768defc66bd893f19c1363e3dc8

    SHA1

    44b9f5f31bb03b40e86077daddf9415f54ce9aad

    SHA256

    03b99ca860437ef5de7b9cf73f2bf13409688e2d4e1691d87c105d887ba4f80c

    SHA512

    bd6f086fbae9614af15f5f57096b4c1eb06e4513dc6de0300bfccecfd5ad30bafba4253fa4ae9c381476ebe0c1655136dc3156903ec42850d83afa18b27d5a30

  • memory/640-1-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/640-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/640-0-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/1060-25-0x00000000006F0000-0x00000000006F6000-memory.dmp

    Filesize

    24KB