Analysis
-
max time kernel
78s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 12:12
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-05_9bd3eb40b9891a71371e7f6747c0f0e6_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-05_9bd3eb40b9891a71371e7f6747c0f0e6_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-05_9bd3eb40b9891a71371e7f6747c0f0e6_cryptolocker.exe
-
Size
32KB
-
MD5
9bd3eb40b9891a71371e7f6747c0f0e6
-
SHA1
6daf93f6f80ed7e0e92ba9ddf8efc7ad93b9c159
-
SHA256
892940e9d5eb9dd79757c4db0f8c29b4646d118ef3e9f96f7c33d7858e32b7d9
-
SHA512
77153d9a07dc6711f97d948f9de25496ea45a4a1b64db4b707ca3a87a52962198d355611e2f5d08b604e2c3475d5ac3e8e9bfdc5e27f9ce096d2ffbe5bdfe190
-
SSDEEP
384:bAvMaNGh4z7CG3POOvbRSLoF/F0QU5XYFnufc/zzo6cJ3vdoe:bAvJCYOOvbRPDEgXRcJX
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation demka.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation 2024-09-05_9bd3eb40b9891a71371e7f6747c0f0e6_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 4364 demka.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-05_9bd3eb40b9891a71371e7f6747c0f0e6_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language demka.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4144 wrote to memory of 4364 4144 2024-09-05_9bd3eb40b9891a71371e7f6747c0f0e6_cryptolocker.exe 88 PID 4144 wrote to memory of 4364 4144 2024-09-05_9bd3eb40b9891a71371e7f6747c0f0e6_cryptolocker.exe 88 PID 4144 wrote to memory of 4364 4144 2024-09-05_9bd3eb40b9891a71371e7f6747c0f0e6_cryptolocker.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-05_9bd3eb40b9891a71371e7f6747c0f0e6_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-05_9bd3eb40b9891a71371e7f6747c0f0e6_cryptolocker.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\demka.exe"C:\Users\Admin\AppData\Local\Temp\demka.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5670e679a457d402c8f8f4cbbaa94c002
SHA16f67682531b39895de69044210dbe98e9ab78e25
SHA256bf39a8bf9ee634e759f18cb101e2927497bf085c6cd46d18da933a301e4b6b05
SHA51261b1887cda39d4072e01b2b24edb047da2e3a5dabadd3eb0fd9acdfea4cc3b2b1f239a4818cb1f99c4fcefd38a0a9a8c5475429520e66b73d326101b1e23b0a4
-
Filesize
185B
MD5c01421ec546b8bb7b581bca10a7c1e6d
SHA17e4e7dde2fc11bd7be0846a0111f9899a83321a4
SHA256181f559d8c65d2c674943fa4f0e1fdb8ede4c7bf0a8df4575f5a4ea31edd089b
SHA512e21d7ba3d424853ba030b2f51eeb8928d7d86b7fee638270f67cb3ec0078c12317b3be13a5638832cc885d92cfc22a82a3b6c66297908dcff7c7e791e596e19f