Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 07:03
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-16_91b2087185936f58c457f18b2f1e2217_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-05-16_91b2087185936f58c457f18b2f1e2217_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-16_91b2087185936f58c457f18b2f1e2217_cryptolocker.exe
-
Size
41KB
-
MD5
91b2087185936f58c457f18b2f1e2217
-
SHA1
b37431fbf4bc894aba6b1499e65acf954fd2fede
-
SHA256
5b475dc8c135e8620ed132a6a90cfd1b870deb60617383569dba08eeedbc4f25
-
SHA512
28ae40ac92873ac3399c8a6db7a77e57d1f63a1f737ce09c1d92c73083360b85e624f557ea9aee1d62b6761d01e6ac94c33bb5125c828044be9d09a024029f5a
-
SSDEEP
768:bAvJCYOOvbRPDEgXrNekd7l94i3pimGZ3E:bAvJCF+RQgJeab4sTsU
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x000900000002341c-12.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 2024-05-16_91b2087185936f58c457f18b2f1e2217_cryptolocker.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation demka.exe -
Executes dropped EXE 1 IoCs
pid Process 1276 demka.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2844 wrote to memory of 1276 2844 2024-05-16_91b2087185936f58c457f18b2f1e2217_cryptolocker.exe 83 PID 2844 wrote to memory of 1276 2844 2024-05-16_91b2087185936f58c457f18b2f1e2217_cryptolocker.exe 83 PID 2844 wrote to memory of 1276 2844 2024-05-16_91b2087185936f58c457f18b2f1e2217_cryptolocker.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-16_91b2087185936f58c457f18b2f1e2217_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-16_91b2087185936f58c457f18b2f1e2217_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\demka.exe"C:\Users\Admin\AppData\Local\Temp\demka.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:1276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD50f7316619146b69f4ae4e611ce0c9a63
SHA191f7ad47cb35ed7efd8607fe7c016d25bbbbdafd
SHA256fdc521d830253d9c327a09b1eabe87f8db0ac15838a486e7b161dd6cb4618d2b
SHA5121f90d8d85bd9565e89346802fa5cc05d2ac50303e4ee4d62d6d9cc95b6ea27c0b01588d8e39d03dd0b1d594ffd17c171a8eb94aea5b2c1e37f492231b25d7d5c
-
Filesize
186B
MD572c6c00c21a3904b07b91afe3cb2e586
SHA16e8b5efd921ca0584de340e44140a35177372453
SHA2566d8249e87230c244a90a92da427ba9d728d8f74e55db94d3dc71656d2f742bde
SHA512f3934326c6dc789ca640ced3e51efb2e7eb05f8da9d685810a274bc45a5f1b6cf7882a934f2a01fb024d6ffd94f1635755f74d856655a0e2739ef3705916d348