Analysis

  • max time kernel
    151s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/03/2024, 16:34

General

  • Target

    2024-03-19_41383e70b3dcb2c9abb1ab916cc880f4_cryptolocker.exe

  • Size

    41KB

  • MD5

    41383e70b3dcb2c9abb1ab916cc880f4

  • SHA1

    702efa2ee60853078164dfc4c186ad0f26503180

  • SHA256

    1573a30d96795616fe174b2fc757bb84e298e67818c532fe513b5fa5c682897c

  • SHA512

    a0a3c9e54112cd88468754d4b8a9229e00c279771e2ff61be10b55569c170c7f3c6700fa65e9e033eac49f6caf42a782fa16402e090df79d8bdfd3c6a4f0a825

  • SSDEEP

    768:bAvJCYOOvbRPDEgXrNekd7l94i3py/yY/Jto:bAvJCF+RQgJeab4sy/lc

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-19_41383e70b3dcb2c9abb1ab916cc880f4_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-19_41383e70b3dcb2c9abb1ab916cc880f4_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1840
    • C:\Users\Admin\AppData\Local\Temp\demka.exe
      "C:\Users\Admin\AppData\Local\Temp\demka.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:1620
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4056 --field-trial-handle=3084,i,11997299123381683778,5904351605020331957,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:1032

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\demka.exe

      Filesize

      41KB

      MD5

      aeba1c3594f4df44680ae5156cb2c9d0

      SHA1

      fc0f3a0ef89b9c650a177474744ab20d1b87ce85

      SHA256

      b96b75bb38fce660f2e97f6db6d3b316df5bfeab86b5b1ef13947286040e8451

      SHA512

      b11844b806597d546cc6c58719ff8aee52cb3a016a14479249fa5942bf180f9ed6b3bee9719b565e9e7cc01243fd52902b9426b2e425e0220b42b1bede020ffb

    • memory/1620-19-0x0000000000520000-0x0000000000526000-memory.dmp

      Filesize

      24KB

    • memory/1840-0-0x0000000002250000-0x0000000002256000-memory.dmp

      Filesize

      24KB

    • memory/1840-1-0x0000000002250000-0x0000000002256000-memory.dmp

      Filesize

      24KB

    • memory/1840-2-0x0000000000400000-0x0000000000406000-memory.dmp

      Filesize

      24KB