Analysis
-
max time kernel
145s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05/01/2024, 05:53
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-01_f7f30c1825b8bcb739d59ec159f46c82_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-01_f7f30c1825b8bcb739d59ec159f46c82_cryptolocker.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-01_f7f30c1825b8bcb739d59ec159f46c82_cryptolocker.exe
-
Size
60KB
-
MD5
f7f30c1825b8bcb739d59ec159f46c82
-
SHA1
7d6399767040ad84bf440cd4a335fb8206b0d56d
-
SHA256
2b50958909d7caa91815f75d5fe2803bf3106cde52441f11fae610484d211846
-
SHA512
1fc0fc1d1eda7aa47a6e325e13953cefc5cd438e9fb6b5c3a71542cfaca9441e867008861d1cb45b3a0a32fa9517bd3be7cd0d71bbc7678ec59538ae0f09e03f
-
SSDEEP
1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1xzp0oj670X:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7m
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2668 hurok.exe -
Loads dropped DLL 1 IoCs
pid Process 1620 2024-01-01_f7f30c1825b8bcb739d59ec159f46c82_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1620 2024-01-01_f7f30c1825b8bcb739d59ec159f46c82_cryptolocker.exe 2668 hurok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2668 1620 2024-01-01_f7f30c1825b8bcb739d59ec159f46c82_cryptolocker.exe 26 PID 1620 wrote to memory of 2668 1620 2024-01-01_f7f30c1825b8bcb739d59ec159f46c82_cryptolocker.exe 26 PID 1620 wrote to memory of 2668 1620 2024-01-01_f7f30c1825b8bcb739d59ec159f46c82_cryptolocker.exe 26 PID 1620 wrote to memory of 2668 1620 2024-01-01_f7f30c1825b8bcb739d59ec159f46c82_cryptolocker.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-01_f7f30c1825b8bcb739d59ec159f46c82_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-01_f7f30c1825b8bcb739d59ec159f46c82_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD57c173d8aed8250f648ff026b1662e202
SHA15bdb85ff00aeb3905fb9095cb9f9d28c3a2c5455
SHA2560c8b7cdb7eea55712d6296ae5b11ef651cc58c507ebb672c888a08026a205b9a
SHA51295822defb54c3672e1c8568fb68084b407d5cab3c8da5f163f36df4929afea8a88bae2191fb64d29e5345afa806eea4f203e77559518315bcfea60a66c3e8712
-
Filesize
22KB
MD59481b0a2c6d2a703bdb3c2301aca533e
SHA1f2ae5a5e28593aefcb4b29dcc5464bf18166ad88
SHA2564c454aa5a00c947d37e08dd81ab0542451d0276d22de9de0b8ad5d5ec87c12f4
SHA5126c3b4e85aa0205d2ef242b68f1c1a05b2115b167ec67ca66bbacefc88ce3a6cfec6b03c46954ff08c8b5d23e418020db3e223256080ff5630e8cc41126dc429f