Analysis
-
max time kernel
140s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
27/08/2023, 16:05
Static task
static1
Behavioral task
behavioral1
Sample
b09e7312e247724da6f63af4101fc6d0_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
b09e7312e247724da6f63af4101fc6d0_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
b09e7312e247724da6f63af4101fc6d0_cryptolocker_JC.exe
-
Size
38KB
-
MD5
b09e7312e247724da6f63af4101fc6d0
-
SHA1
a5e000ebda29b973e6bb5a0622e1081616059d35
-
SHA256
a5aaa1ee6d7ccdf026fa55a7f476af4682aad18fbb5dac8b89924ae141dd008e
-
SHA512
4ae7c86da1f65f01ddb6dd466312e9300ad307d2b6e9fb9b68f2af20c38c26877f90b76749a54317efa6591be346738a140914c32baad67d0d85dbe47caa9a02
-
SSDEEP
768:Kf1K2exg2kBwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZsBGGpebVIYLHA3KxU:o1KhxqwtdgI2MyzNORQtOflIwoHNV2X9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1580 hurok.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2880 wrote to memory of 1580 2880 b09e7312e247724da6f63af4101fc6d0_cryptolocker_JC.exe 81 PID 2880 wrote to memory of 1580 2880 b09e7312e247724da6f63af4101fc6d0_cryptolocker_JC.exe 81 PID 2880 wrote to memory of 1580 2880 b09e7312e247724da6f63af4101fc6d0_cryptolocker_JC.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\b09e7312e247724da6f63af4101fc6d0_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\b09e7312e247724da6f63af4101fc6d0_cryptolocker_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Executes dropped EXE
PID:1580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD572d558a727d84176db4c5e8be4d9d7c5
SHA194f2e41be73cb0c3644920e21d0d19995a0a212c
SHA2566799659c4cb8cdc9e5de8b85169f517580ffc538a57c04ba05a22495ce6ecaa3
SHA5121fd3565faa039dcc622e35dba09831a47d481b781b2208ad9b410afff8ed06c650d550a439a6da90667dda77c594b9db7460a3104224495c99adf9569546f752
-
Filesize
38KB
MD572d558a727d84176db4c5e8be4d9d7c5
SHA194f2e41be73cb0c3644920e21d0d19995a0a212c
SHA2566799659c4cb8cdc9e5de8b85169f517580ffc538a57c04ba05a22495ce6ecaa3
SHA5121fd3565faa039dcc622e35dba09831a47d481b781b2208ad9b410afff8ed06c650d550a439a6da90667dda77c594b9db7460a3104224495c99adf9569546f752
-
Filesize
38KB
MD572d558a727d84176db4c5e8be4d9d7c5
SHA194f2e41be73cb0c3644920e21d0d19995a0a212c
SHA2566799659c4cb8cdc9e5de8b85169f517580ffc538a57c04ba05a22495ce6ecaa3
SHA5121fd3565faa039dcc622e35dba09831a47d481b781b2208ad9b410afff8ed06c650d550a439a6da90667dda77c594b9db7460a3104224495c99adf9569546f752