Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    17-08-2023 18:06

General

  • Target

    1d5747374a6cb2936197d8b082787025_cryptolocker_JC.exe

  • Size

    58KB

  • MD5

    1d5747374a6cb2936197d8b082787025

  • SHA1

    35ab10e6cef07a1ecc6f200cee0e91c8e0c51cca

  • SHA256

    846ef984a059466dd689b7123de595a6886b8b17141e6c58f56d2982f1b91e99

  • SHA512

    1e16bbd8048bcc9fe268a714cb859e715a9b589a7d01569593f62dcc11268102e3fec99e5c7d1bc5aa0af6a58b818b87e4eabc5f9be85f3e02a4aef1779e2b54

  • SSDEEP

    1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1xzp0oj670u:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7v

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d5747374a6cb2936197d8b082787025_cryptolocker_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\1d5747374a6cb2936197d8b082787025_cryptolocker_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    58KB

    MD5

    e1a1f38b981d3483d597decb463987b5

    SHA1

    a5abe18ef20c522e515a69f3a3666b7905ed7ed4

    SHA256

    2b476481e11b567e597d0c7d8449cdf9166ce50ab3b5f5dd92551b773e0c11a9

    SHA512

    10869299cfbd36c91fd9b0ca5b7b3b083b3c9470d97e1ed33ca79a2b7831a4474ce3b44d5b49ef41f877a9e2dd1b5d1d46832d123643dd7987bcb90bf21c0939

  • C:\Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    58KB

    MD5

    e1a1f38b981d3483d597decb463987b5

    SHA1

    a5abe18ef20c522e515a69f3a3666b7905ed7ed4

    SHA256

    2b476481e11b567e597d0c7d8449cdf9166ce50ab3b5f5dd92551b773e0c11a9

    SHA512

    10869299cfbd36c91fd9b0ca5b7b3b083b3c9470d97e1ed33ca79a2b7831a4474ce3b44d5b49ef41f877a9e2dd1b5d1d46832d123643dd7987bcb90bf21c0939

  • \Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    58KB

    MD5

    e1a1f38b981d3483d597decb463987b5

    SHA1

    a5abe18ef20c522e515a69f3a3666b7905ed7ed4

    SHA256

    2b476481e11b567e597d0c7d8449cdf9166ce50ab3b5f5dd92551b773e0c11a9

    SHA512

    10869299cfbd36c91fd9b0ca5b7b3b083b3c9470d97e1ed33ca79a2b7831a4474ce3b44d5b49ef41f877a9e2dd1b5d1d46832d123643dd7987bcb90bf21c0939

  • memory/112-71-0x0000000000310000-0x0000000000316000-memory.dmp

    Filesize

    24KB

  • memory/2316-54-0x0000000000230000-0x0000000000236000-memory.dmp

    Filesize

    24KB

  • memory/2316-56-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2316-55-0x0000000000230000-0x0000000000236000-memory.dmp

    Filesize

    24KB