Analysis
-
max time kernel
93s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 03:31
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-29_8e1bdac3e0828625c3d64cecfff028f4_cryptolocker.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-05-29_8e1bdac3e0828625c3d64cecfff028f4_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-29_8e1bdac3e0828625c3d64cecfff028f4_cryptolocker.exe
-
Size
37KB
-
MD5
8e1bdac3e0828625c3d64cecfff028f4
-
SHA1
8b202a8e78059df99dbdebc7507d02f9d6cf6c22
-
SHA256
90c73e919e32b4d3a3395a9bc59224d8793028656c32b64637e5ee1479c6ad8c
-
SHA512
f15b9fe06d3226f28d3a89e09777d3ef46e3f503fdee656683f05885265741a17cb7415476707dc0252c7574328b4d37b38de7e817a100d3a0d367f89f197283
-
SSDEEP
768:bAvJCYOOvbRPDEgXrNekd7l94i3pQheDF:bAvJCF+RQgJeab4sb5
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x0005000000022f40-12.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation 2024-05-29_8e1bdac3e0828625c3d64cecfff028f4_cryptolocker.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation demka.exe -
Executes dropped EXE 1 IoCs
pid Process 1552 demka.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4508 wrote to memory of 1552 4508 2024-05-29_8e1bdac3e0828625c3d64cecfff028f4_cryptolocker.exe 82 PID 4508 wrote to memory of 1552 4508 2024-05-29_8e1bdac3e0828625c3d64cecfff028f4_cryptolocker.exe 82 PID 4508 wrote to memory of 1552 4508 2024-05-29_8e1bdac3e0828625c3d64cecfff028f4_cryptolocker.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-29_8e1bdac3e0828625c3d64cecfff028f4_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-29_8e1bdac3e0828625c3d64cecfff028f4_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\demka.exe"C:\Users\Admin\AppData\Local\Temp\demka.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:1552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD54417a51ef28a7ad5a38448281b2afcf6
SHA1364566f4bd2c7ca026d4a6455010c41c0a78fe85
SHA256b4781ab82be94bfc680ea378fef3c9f1c1b40034e962d9513d926468fc42a136
SHA512f9fac385bc7e4095c6c8b5fd61e06fb4c4a007a4c9194b11f38ead54d027824ad0e2cce45a0656d676bfa199cc8d34be30662b0d95a7879a9a67885382805529
-
Filesize
186B
MD5b9f4374f896f9983c33e9d0b588f0013
SHA1b8020e1be1ca994b0c92448b8751de82b01cc9b5
SHA2566693eb10ef2b6399732cb13c54af5cbb990215fb265d3c2cc13133461b9f4d27
SHA512fbee8e10e523ac919928b0144d098481fc9ead831f0e00a94d2d55bf17bb55e8186629394cd1c7787f0c0aa9b82f743b1768d03bbc6413205538b29d0541ac74