Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    04/08/2023, 17:39

General

  • Target

    646aa2cdd5662ad5f40698b55ccf4b86_cryptolocker_JC.exe

  • Size

    61KB

  • MD5

    646aa2cdd5662ad5f40698b55ccf4b86

  • SHA1

    b3cdd9bda015d17c0f207376178838f705d5ff21

  • SHA256

    87b292f34eb261a90887c1bef70d70451acb809c27cb3e1943d616ada0e14aba

  • SHA512

    c127c735cbc184ef3e9f70be74343a16e93a2c8f2d04da0705ce7bc48b738920bbeb4776b31b5f21637c04797a808a729020dd3214334662110f674cfdece6f3

  • SSDEEP

    1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1xo3/nyx+l:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7z

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\646aa2cdd5662ad5f40698b55ccf4b86_cryptolocker_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\646aa2cdd5662ad5f40698b55ccf4b86_cryptolocker_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2136
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:1628

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\hurok.exe

          Filesize

          61KB

          MD5

          526edc7e9d47b0f4c330146fdb59e128

          SHA1

          f7b5c95faacad7bcbeb937f4513b0eb5aff6a938

          SHA256

          0155b896cd5fbe99cabd1bfb7ed1a9e3b4cd62c6b251d375260fb1d9e6727cce

          SHA512

          ee7ba16da84efc364c15c81d89636138a9d0083d1f2e011d251b405048d8e9572aaf9547045884cc883a79f38147dbfdea3834abdb53ba577497cca34199b764

        • C:\Users\Admin\AppData\Local\Temp\hurok.exe

          Filesize

          61KB

          MD5

          526edc7e9d47b0f4c330146fdb59e128

          SHA1

          f7b5c95faacad7bcbeb937f4513b0eb5aff6a938

          SHA256

          0155b896cd5fbe99cabd1bfb7ed1a9e3b4cd62c6b251d375260fb1d9e6727cce

          SHA512

          ee7ba16da84efc364c15c81d89636138a9d0083d1f2e011d251b405048d8e9572aaf9547045884cc883a79f38147dbfdea3834abdb53ba577497cca34199b764

        • \Users\Admin\AppData\Local\Temp\hurok.exe

          Filesize

          61KB

          MD5

          526edc7e9d47b0f4c330146fdb59e128

          SHA1

          f7b5c95faacad7bcbeb937f4513b0eb5aff6a938

          SHA256

          0155b896cd5fbe99cabd1bfb7ed1a9e3b4cd62c6b251d375260fb1d9e6727cce

          SHA512

          ee7ba16da84efc364c15c81d89636138a9d0083d1f2e011d251b405048d8e9572aaf9547045884cc883a79f38147dbfdea3834abdb53ba577497cca34199b764

        • memory/1628-69-0x00000000002C0000-0x00000000002C6000-memory.dmp

          Filesize

          24KB

        • memory/2136-53-0x00000000002B0000-0x00000000002B6000-memory.dmp

          Filesize

          24KB

        • memory/2136-55-0x00000000002B0000-0x00000000002B6000-memory.dmp

          Filesize

          24KB

        • memory/2136-54-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB