Analysis

  • max time kernel
    127s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-08-2023 17:03

General

  • Target

    7a65dac7013b6c902bd8f105f80c5b09_cryptolocker_JC.exe

  • Size

    59KB

  • MD5

    7a65dac7013b6c902bd8f105f80c5b09

  • SHA1

    736274077f8cca1af47703ea7cabaa9f90e517ba

  • SHA256

    c7485384680ea51f3a8c2902b78e366c183ee5c459acd80708ea6d5853148b4f

  • SHA512

    7c0b227a01c88255a7bb59ddbcf4e63996e2d650275da120bd5b9a8a3876d237f76c93c2eb50100e68ddc4c4cb5ed6d03baf4a5bd9c5a61b854813cd12bd015c

  • SSDEEP

    1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszudTYTjipvF2of:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7i

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a65dac7013b6c902bd8f105f80c5b09_cryptolocker_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\7a65dac7013b6c902bd8f105f80c5b09_cryptolocker_JC.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Executes dropped EXE
      PID:5064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    59KB

    MD5

    97a36ba5df3f0bea886252bb4a84e68e

    SHA1

    170b89725352bb29c8ea0bc971d57d330211e208

    SHA256

    a65050ad430eb35b79ad2046f6fb216e8662f7dfaa4427218f47c403c99cacdd

    SHA512

    71c28fd2837f2d9d2105b0c9abb2eafb1ee7bd510635b194820bc4a73a28cfd990af58ad62fbcc419cc25c8a905473a81303b8ce0a397323c52132a633ba9294

  • C:\Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    59KB

    MD5

    97a36ba5df3f0bea886252bb4a84e68e

    SHA1

    170b89725352bb29c8ea0bc971d57d330211e208

    SHA256

    a65050ad430eb35b79ad2046f6fb216e8662f7dfaa4427218f47c403c99cacdd

    SHA512

    71c28fd2837f2d9d2105b0c9abb2eafb1ee7bd510635b194820bc4a73a28cfd990af58ad62fbcc419cc25c8a905473a81303b8ce0a397323c52132a633ba9294

  • C:\Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    59KB

    MD5

    97a36ba5df3f0bea886252bb4a84e68e

    SHA1

    170b89725352bb29c8ea0bc971d57d330211e208

    SHA256

    a65050ad430eb35b79ad2046f6fb216e8662f7dfaa4427218f47c403c99cacdd

    SHA512

    71c28fd2837f2d9d2105b0c9abb2eafb1ee7bd510635b194820bc4a73a28cfd990af58ad62fbcc419cc25c8a905473a81303b8ce0a397323c52132a633ba9294

  • memory/2380-0-0x00000000005D0000-0x00000000005D6000-memory.dmp

    Filesize

    24KB

  • memory/2380-1-0x00000000005D0000-0x00000000005D6000-memory.dmp

    Filesize

    24KB

  • memory/2380-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/5064-19-0x0000000000560000-0x0000000000566000-memory.dmp

    Filesize

    24KB