Analysis
-
max time kernel
131s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 21:54
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-25_67e01c0693d84f16ad1dd33ac2273bf1_cryptolocker.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-05-25_67e01c0693d84f16ad1dd33ac2273bf1_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-25_67e01c0693d84f16ad1dd33ac2273bf1_cryptolocker.exe
-
Size
37KB
-
MD5
67e01c0693d84f16ad1dd33ac2273bf1
-
SHA1
943b4e1e0371c682efe58c12953da824fb4b20fb
-
SHA256
5cc1ea8f1a2913c2eddbda42c24c01f196271c03ffe093cebd123e73f7b69152
-
SHA512
332e424368706599b152f567894129448ec87f3dbbaf1a201fe9cff76dabf1d6819169edb6b913e3b201b9e8b269e1e4c92c08e9590975b3172ddb846e648907
-
SSDEEP
768:bAvJCYOOvbRPDEgXrNekd7l94i3pQheDh88:bAvJCF+RQgJeab4sbl
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x0009000000023297-12.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation 2024-05-25_67e01c0693d84f16ad1dd33ac2273bf1_cryptolocker.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation demka.exe -
Executes dropped EXE 1 IoCs
pid Process 3368 demka.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2876 wrote to memory of 3368 2876 2024-05-25_67e01c0693d84f16ad1dd33ac2273bf1_cryptolocker.exe 83 PID 2876 wrote to memory of 3368 2876 2024-05-25_67e01c0693d84f16ad1dd33ac2273bf1_cryptolocker.exe 83 PID 2876 wrote to memory of 3368 2876 2024-05-25_67e01c0693d84f16ad1dd33ac2273bf1_cryptolocker.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_67e01c0693d84f16ad1dd33ac2273bf1_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-25_67e01c0693d84f16ad1dd33ac2273bf1_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\demka.exe"C:\Users\Admin\AppData\Local\Temp\demka.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:3368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD5ca009e84ffaf9acede96e2f38dee109f
SHA1f935b17151028d8bf234800803e8a1e2f7af6183
SHA256b1b225f703c3ac9df50d2fd734ed2fffa1aedc0aff139435dc5723b298fe58c2
SHA512aed4b80ef15774917c8de0b44ee023b9941983e08b5f210385567bdd6c44e29778bf5d4a5b714f05f4cf688e5c5dfb9652e20974695e9aadd8a4b9fea3fa8b63
-
Filesize
186B
MD5c4504895809873e2b42dd078082d9443
SHA109e7300087d2714186d255659da4145531ca4c78
SHA2568ff9f7a7d8f3b3f26aa78668823739aa66e1205d14f63096238ce5cf169b1ae5
SHA512c21bc66f3acf5c3a9a465b2212001741869bc6b44689b10eefc8bb6645ce0e13538140bbfb92de835f666b2dba2433a5d301d8c4e3ca701673f9f4cdcd0e7561