Analysis

  • max time kernel
    140s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/08/2023, 16:05

General

  • Target

    b09e7312e247724da6f63af4101fc6d0_cryptolocker_JC.exe

  • Size

    38KB

  • MD5

    b09e7312e247724da6f63af4101fc6d0

  • SHA1

    a5e000ebda29b973e6bb5a0622e1081616059d35

  • SHA256

    a5aaa1ee6d7ccdf026fa55a7f476af4682aad18fbb5dac8b89924ae141dd008e

  • SHA512

    4ae7c86da1f65f01ddb6dd466312e9300ad307d2b6e9fb9b68f2af20c38c26877f90b76749a54317efa6591be346738a140914c32baad67d0d85dbe47caa9a02

  • SSDEEP

    768:Kf1K2exg2kBwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZsBGGpebVIYLHA3KxU:o1KhxqwtdgI2MyzNORQtOflIwoHNV2X9

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b09e7312e247724da6f63af4101fc6d0_cryptolocker_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\b09e7312e247724da6f63af4101fc6d0_cryptolocker_JC.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2880
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Executes dropped EXE
      PID:1580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    38KB

    MD5

    72d558a727d84176db4c5e8be4d9d7c5

    SHA1

    94f2e41be73cb0c3644920e21d0d19995a0a212c

    SHA256

    6799659c4cb8cdc9e5de8b85169f517580ffc538a57c04ba05a22495ce6ecaa3

    SHA512

    1fd3565faa039dcc622e35dba09831a47d481b781b2208ad9b410afff8ed06c650d550a439a6da90667dda77c594b9db7460a3104224495c99adf9569546f752

  • C:\Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    38KB

    MD5

    72d558a727d84176db4c5e8be4d9d7c5

    SHA1

    94f2e41be73cb0c3644920e21d0d19995a0a212c

    SHA256

    6799659c4cb8cdc9e5de8b85169f517580ffc538a57c04ba05a22495ce6ecaa3

    SHA512

    1fd3565faa039dcc622e35dba09831a47d481b781b2208ad9b410afff8ed06c650d550a439a6da90667dda77c594b9db7460a3104224495c99adf9569546f752

  • C:\Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    38KB

    MD5

    72d558a727d84176db4c5e8be4d9d7c5

    SHA1

    94f2e41be73cb0c3644920e21d0d19995a0a212c

    SHA256

    6799659c4cb8cdc9e5de8b85169f517580ffc538a57c04ba05a22495ce6ecaa3

    SHA512

    1fd3565faa039dcc622e35dba09831a47d481b781b2208ad9b410afff8ed06c650d550a439a6da90667dda77c594b9db7460a3104224495c99adf9569546f752

  • memory/1580-20-0x00000000005C0000-0x00000000005C6000-memory.dmp

    Filesize

    24KB

  • memory/2880-0-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/2880-1-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/2880-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB