Analysis

  • max time kernel
    93s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/04/2024, 23:23

General

  • Target

    2024-04-08_30158bcc4f0652945d4ad0270804bd70_cryptolocker.exe

  • Size

    40KB

  • MD5

    30158bcc4f0652945d4ad0270804bd70

  • SHA1

    02c2178cef1815e7ceae75dba6fb3b9ed9cf0b9c

  • SHA256

    71185f7e1ef8edb72fcbd6532fb9741c58a29df342ba4ccba98fdd4d2b571557

  • SHA512

    93c8766c0a853da392d1e679a80c2de8eb2b30b72bdb055e5694b9cedda2682fac4e865ab324b5c9f61c482a31b4138545446b2765a6c9448e0044a0318d57a8

  • SSDEEP

    384:bAvMaNGh4z7CG3POOvbRSLoF/F0QU5XYFnufc/zzoiM8Nekdvjl9V50i3Nby6UsC:bAvJCYOOvbRPDEgXrNekd7l94i3py/yW

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-08_30158bcc4f0652945d4ad0270804bd70_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-08_30158bcc4f0652945d4ad0270804bd70_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4496
    • C:\Users\Admin\AppData\Local\Temp\demka.exe
      "C:\Users\Admin\AppData\Local\Temp\demka.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\demka.exe

    Filesize

    40KB

    MD5

    98c05ed0e0e175e8a379c3c17ef6c817

    SHA1

    743d0444752de81088712c90c9999c5fb902a563

    SHA256

    af01f8dd21b1c2285d7d7d3c14260c9949010c84f7e28f260c7f7b0b122368f2

    SHA512

    b91c2b110b1b171eb4f580762f261836a46b101439fc3bb20e5dc400a578a9db3c68946cedb43d4b37d1b4700d5de67b5d1c4ba8e6d61f42df7b06ef3b25f677

  • memory/220-25-0x0000000002D60000-0x0000000002D66000-memory.dmp

    Filesize

    24KB

  • memory/4496-0-0x00000000021D0000-0x00000000021D6000-memory.dmp

    Filesize

    24KB

  • memory/4496-1-0x00000000021D0000-0x00000000021D6000-memory.dmp

    Filesize

    24KB

  • memory/4496-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB