Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/01/2024, 12:05

General

  • Target

    2024-01-06_0a329a8ccb7c1711685594f09551725e_cryptolocker.exe

  • Size

    62KB

  • MD5

    0a329a8ccb7c1711685594f09551725e

  • SHA1

    672b7fcb229d3d8f30576ef9e718ae6dc466fa6a

  • SHA256

    053b06be9f79a59cf19bf5eb78190a9d299fb6c7d9d0c3786251a0ae3fb59bfa

  • SHA512

    3f0645e9b6d3263bf42171ce6a9c51c76c0fdaa17ee720c123743c73fc861b76885e4daa9ab5858b91e889ef648b12dcfd0e521061d1ebe9b5810b8e21c91955

  • SSDEEP

    1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1x/9lfL+gniDScQ:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7w

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-06_0a329a8ccb7c1711685594f09551725e_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-06_0a329a8ccb7c1711685594f09551725e_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1564
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:2028

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\hurok.exe

          Filesize

          63KB

          MD5

          2e4733de2e0f0d57d9f3339bf7a61bc0

          SHA1

          6be932f11bf962d94c4432349aa29e7a149ef470

          SHA256

          85f056483e9475dd5e2a103abacffba8bf4edb1d093842f6cd2c10522422792f

          SHA512

          f25d0d33c713fd19b3d3882b06a7b1d6881c6593035c1221598db23e5e5e9e1c4848a5b558fef2fa68372b0bd939e4423ff5a178cb877a51f5ae57c5e965d825

        • memory/1564-0-0x0000000002210000-0x0000000002216000-memory.dmp

          Filesize

          24KB

        • memory/1564-1-0x0000000002210000-0x0000000002216000-memory.dmp

          Filesize

          24KB

        • memory/1564-2-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/2028-25-0x0000000000560000-0x0000000000566000-memory.dmp

          Filesize

          24KB