Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/05/2024, 01:41

General

  • Target

    2024-05-24_ccffdc1c6a141ad3b4215ecbda7b1a31_cryptolocker.exe

  • Size

    43KB

  • MD5

    ccffdc1c6a141ad3b4215ecbda7b1a31

  • SHA1

    17c0610c8668934450171747890eb3ea7d539774

  • SHA256

    9408d69937bb68428acbee3ff4bf4fb32edf3c0afa042fe0a61fac7da10f7976

  • SHA512

    c8c93933e57222ecabde45d69f8f796d314c52cd43e4bd84b3b5162664aba3dcf4cd55c36c5508c82524f1915723f8b2fa21f4c55dd4d46dbcbe8c55d725d108

  • SSDEEP

    768:bAvJCYOOvbRPDEgXrNekd7l94i3py/yY/J6:bAvJCF+RQgJeab4sy/lA

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-24_ccffdc1c6a141ad3b4215ecbda7b1a31_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-24_ccffdc1c6a141ad3b4215ecbda7b1a31_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1164
    • C:\Users\Admin\AppData\Local\Temp\demka.exe
      "C:\Users\Admin\AppData\Local\Temp\demka.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:2872

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\demka.exe

          Filesize

          43KB

          MD5

          d79269d54a8e6b561464f121c66d6e5c

          SHA1

          aaeec8106998f5b63f229756134ce51382ba9ecd

          SHA256

          066320fea11254193ed8e6ebdb5e4313034a4fcc977bc7d2090319df8f2e1c3f

          SHA512

          583fdf547116183e423385ba1c6a85d9df353c8bddce86ccfdbbac5b614139fad4718330748633b0aa090fdb22bbf3120ddf488e6022d684e8a6d4f956169881

        • C:\Users\Admin\AppData\Local\Temp\medkem.exe

          Filesize

          186B

          MD5

          29b947b1e8a0b29883a7a6b8f514680c

          SHA1

          6c647ea87f9edd512231fac88ad4df8fe735d2f7

          SHA256

          fab52f83f69c857f0baef5545a8b81e6ea74fa3d226484b023ddb97047fc62ce

          SHA512

          9af40a260e11c6bb845a7dccf22be8b4ccc9444003316c457efb953b9f6ae0821a4025abc52bb264b11eeb22a8ec8ca31620ea93328b8fa81df861233e412c0b

        • memory/1164-0-0x0000000000700000-0x0000000000706000-memory.dmp

          Filesize

          24KB

        • memory/1164-1-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/1164-8-0x0000000000700000-0x0000000000706000-memory.dmp

          Filesize

          24KB

        • memory/2872-25-0x0000000002010000-0x0000000002016000-memory.dmp

          Filesize

          24KB