Analysis
-
max time kernel
129s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
31/10/2023, 15:37
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-08_6de8fd8222a357db09e0cc0f62e141fd_cryptolocker_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.2023-09-08_6de8fd8222a357db09e0cc0f62e141fd_cryptolocker_JC.exe
Resource
win10v2004-20231025-en
General
-
Target
NEAS.2023-09-08_6de8fd8222a357db09e0cc0f62e141fd_cryptolocker_JC.exe
-
Size
60KB
-
MD5
6de8fd8222a357db09e0cc0f62e141fd
-
SHA1
6ae60d152310a79b12db34ada3ebb6899324d42d
-
SHA256
229893dd6158dd36e1671e9143aa4a5810b2f93aa01ea0de2dc40647e61d195f
-
SHA512
072b81c3721ff7cd50037c1319fb54e1b6fe6341ea417b848afb6ebf24d713ffae4df8095e2455c5b9559e0cd86936cdd8dbb8c5338a5b4f94f7d3e6ca312ca5
-
SSDEEP
1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszudnYTjipvF29x:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7T
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2516 hurok.exe -
Loads dropped DLL 1 IoCs
pid Process 1532 NEAS.2023-09-08_6de8fd8222a357db09e0cc0f62e141fd_cryptolocker_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1532 NEAS.2023-09-08_6de8fd8222a357db09e0cc0f62e141fd_cryptolocker_JC.exe 2516 hurok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1532 wrote to memory of 2516 1532 NEAS.2023-09-08_6de8fd8222a357db09e0cc0f62e141fd_cryptolocker_JC.exe 28 PID 1532 wrote to memory of 2516 1532 NEAS.2023-09-08_6de8fd8222a357db09e0cc0f62e141fd_cryptolocker_JC.exe 28 PID 1532 wrote to memory of 2516 1532 NEAS.2023-09-08_6de8fd8222a357db09e0cc0f62e141fd_cryptolocker_JC.exe 28 PID 1532 wrote to memory of 2516 1532 NEAS.2023-09-08_6de8fd8222a357db09e0cc0f62e141fd_cryptolocker_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-08_6de8fd8222a357db09e0cc0f62e141fd_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-08_6de8fd8222a357db09e0cc0f62e141fd_cryptolocker_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD55bd94f05718a2357324e5af1eb2c6033
SHA18ec8442ef2cafef92f33a3dd5fd44f6ecbea7ffa
SHA256b4b142407e25a1595d4b257ab0b7c63ad99d0cfa4e52985731ad3730640126fa
SHA51299521a46aa5b39be0cdd94c9483aa88c3de4cef8d34abf79364dfdb42ca81c12dd74b4a242b1158afaf484fbed6f3731bab5a6f98948f4fa9d172e1180a84569
-
Filesize
60KB
MD55bd94f05718a2357324e5af1eb2c6033
SHA18ec8442ef2cafef92f33a3dd5fd44f6ecbea7ffa
SHA256b4b142407e25a1595d4b257ab0b7c63ad99d0cfa4e52985731ad3730640126fa
SHA51299521a46aa5b39be0cdd94c9483aa88c3de4cef8d34abf79364dfdb42ca81c12dd74b4a242b1158afaf484fbed6f3731bab5a6f98948f4fa9d172e1180a84569
-
Filesize
60KB
MD55bd94f05718a2357324e5af1eb2c6033
SHA18ec8442ef2cafef92f33a3dd5fd44f6ecbea7ffa
SHA256b4b142407e25a1595d4b257ab0b7c63ad99d0cfa4e52985731ad3730640126fa
SHA51299521a46aa5b39be0cdd94c9483aa88c3de4cef8d34abf79364dfdb42ca81c12dd74b4a242b1158afaf484fbed6f3731bab5a6f98948f4fa9d172e1180a84569