Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-05-2024 07:03

General

  • Target

    2024-05-16_91b2087185936f58c457f18b2f1e2217_cryptolocker.exe

  • Size

    41KB

  • MD5

    91b2087185936f58c457f18b2f1e2217

  • SHA1

    b37431fbf4bc894aba6b1499e65acf954fd2fede

  • SHA256

    5b475dc8c135e8620ed132a6a90cfd1b870deb60617383569dba08eeedbc4f25

  • SHA512

    28ae40ac92873ac3399c8a6db7a77e57d1f63a1f737ce09c1d92c73083360b85e624f557ea9aee1d62b6761d01e6ac94c33bb5125c828044be9d09a024029f5a

  • SSDEEP

    768:bAvJCYOOvbRPDEgXrNekd7l94i3pimGZ3E:bAvJCF+RQgJeab4sTsU

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-16_91b2087185936f58c457f18b2f1e2217_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-16_91b2087185936f58c457f18b2f1e2217_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2844
    • C:\Users\Admin\AppData\Local\Temp\demka.exe
      "C:\Users\Admin\AppData\Local\Temp\demka.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:1276

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\demka.exe

    Filesize

    41KB

    MD5

    0f7316619146b69f4ae4e611ce0c9a63

    SHA1

    91f7ad47cb35ed7efd8607fe7c016d25bbbbdafd

    SHA256

    fdc521d830253d9c327a09b1eabe87f8db0ac15838a486e7b161dd6cb4618d2b

    SHA512

    1f90d8d85bd9565e89346802fa5cc05d2ac50303e4ee4d62d6d9cc95b6ea27c0b01588d8e39d03dd0b1d594ffd17c171a8eb94aea5b2c1e37f492231b25d7d5c

  • C:\Users\Admin\AppData\Local\Temp\medkem.exe

    Filesize

    186B

    MD5

    72c6c00c21a3904b07b91afe3cb2e586

    SHA1

    6e8b5efd921ca0584de340e44140a35177372453

    SHA256

    6d8249e87230c244a90a92da427ba9d728d8f74e55db94d3dc71656d2f742bde

    SHA512

    f3934326c6dc789ca640ced3e51efb2e7eb05f8da9d685810a274bc45a5f1b6cf7882a934f2a01fb024d6ffd94f1635755f74d856655a0e2739ef3705916d348

  • memory/1276-25-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/2844-0-0x0000000002350000-0x0000000002356000-memory.dmp

    Filesize

    24KB

  • memory/2844-8-0x0000000002350000-0x0000000002356000-memory.dmp

    Filesize

    24KB

  • memory/2844-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB