Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2024 07:38

General

  • Target

    2024-03-27_bb38de82ab77a4287d7a5a62979b27e5_cryptolocker.exe

  • Size

    33KB

  • MD5

    bb38de82ab77a4287d7a5a62979b27e5

  • SHA1

    f1902a140926d78e71827b5a418ad3ff7abd8061

  • SHA256

    e1808c4788148bd920b4d4681382b4fa870a3812e64f5964c1d85a10e0a390f1

  • SHA512

    8da8f639bac4b987ce10c0e61f1eb13f42304da354b684560bb16b13c33a87ee3dc44376b5bddc54d13f7aa7a0a3bc085d49e4914c6e52edf4d8ce5e39eb9ae0

  • SSDEEP

    384:bAvMaNGh4z7CG3POOvbRSLoF/F0QU5XYFnufc/zzo6ckJp0qAgmEzXKxA+Bn:bAvJCYOOvbRPDEgXRc+BAILwn

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-27_bb38de82ab77a4287d7a5a62979b27e5_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-27_bb38de82ab77a4287d7a5a62979b27e5_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:444
    • C:\Users\Admin\AppData\Local\Temp\demka.exe
      "C:\Users\Admin\AppData\Local\Temp\demka.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:4792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\demka.exe

    Filesize

    33KB

    MD5

    ae55f83f3894cdad3e2f7251f4b72c4f

    SHA1

    c5e2461b118993e96029096dda8affdb8ba9c455

    SHA256

    2fbc07160b265b3e59b1682de2feddf00cfcd955c654d3f1dd229b1bdb244deb

    SHA512

    389c6033b8c63b50311e17738686471464e023e2df986c9cdaa80a783c5b92b171fbf4979695e3649fc3b0a6e28d504a02dfafd4f26b3f75dad8d245d9785de2

  • memory/444-0-0x0000000002250000-0x0000000002256000-memory.dmp

    Filesize

    24KB

  • memory/444-1-0x0000000002250000-0x0000000002256000-memory.dmp

    Filesize

    24KB

  • memory/444-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/4792-22-0x0000000001F90000-0x0000000001F96000-memory.dmp

    Filesize

    24KB