Analysis

  • max time kernel
    146s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-02-2024 05:50

General

  • Target

    2024-02-23_66d7086b440f1b1a8c213fdd1f66a9b9_cryptolocker.exe

  • Size

    31KB

  • MD5

    66d7086b440f1b1a8c213fdd1f66a9b9

  • SHA1

    adec7cbf5668e66fc05f47222352e7f96540ec0e

  • SHA256

    d7af95af83ea504a9d0bd908be3e43907d9a1965f37025d4bc1e91b312ad1a4c

  • SHA512

    f91228b037b053877ae53f645f4c30cb212fc93b5197597146286662a3babdc244095551b8248a6f98d8b0b5455a54de740ad321ca18a749a6c035301d247c7c

  • SSDEEP

    384:bAvMaNGh4z7CG3POOvbRSLoF/F0QU5XYFnufc/zzo6ckJp0qXpeh9dHz:bAvJCYOOvbRPDEgXRc+BXpadT

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-23_66d7086b440f1b1a8c213fdd1f66a9b9_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-23_66d7086b440f1b1a8c213fdd1f66a9b9_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1528
    • C:\Users\Admin\AppData\Local\Temp\demka.exe
      "C:\Users\Admin\AppData\Local\Temp\demka.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:1828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\demka.exe

    Filesize

    31KB

    MD5

    830fb2a44be265be76e7924051e43a32

    SHA1

    d00887bfbf4c201f8f16389d0e51b6d6838354d6

    SHA256

    1415aabd30f3abdbf663b7622fcf4347795efacba8e171ce702c74306d5df388

    SHA512

    aba2aab69d60cb985007d902f0be5c06e92775587864857008b8df6ec163fd60b67b27b41ba99d75ece325e2d41388f1d6a7fc2f70f62b8a22c0f3c61bbe5785

  • memory/1528-0-0x00000000021D0000-0x00000000021D6000-memory.dmp

    Filesize

    24KB

  • memory/1528-1-0x00000000021D0000-0x00000000021D6000-memory.dmp

    Filesize

    24KB

  • memory/1528-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/1828-19-0x00000000020A0000-0x00000000020A6000-memory.dmp

    Filesize

    24KB