Analysis

  • max time kernel
    0s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    09/01/2024, 06:49

General

  • Target

    2024-01-08_e1cd0e854fba0846cb0553b5689037c0_cryptolocker.exe

  • Size

    63KB

  • MD5

    e1cd0e854fba0846cb0553b5689037c0

  • SHA1

    c119d65a32d366e6e33a9b342290b9361ad1963e

  • SHA256

    f5d74133d7206debf86400980504bb6383ab7316cc0e99e48ec0748a3133bf45

  • SHA512

    37ab4c6a6cb15899527a6ed7e32e251b2d044045976f78864521acb4130af982ac38b0b9012eed0762cf7995f3f8794316a6f142c7d0d36a146ca836e4ad9dd2

  • SSDEEP

    1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1x/9lfL+gniDScy:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7S

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\hurok.exe
    "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of UnmapMainImage
    PID:1228
  • C:\Users\Admin\AppData\Local\Temp\2024-01-08_e1cd0e854fba0846cb0553b5689037c0_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-08_e1cd0e854fba0846cb0553b5689037c0_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2128

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\hurok.exe

          Filesize

          7KB

          MD5

          b879d57e3c871293eddc476920188c2e

          SHA1

          6c239cf67b5a507317909e88672c1a003c4d419a

          SHA256

          da0dea75986c420a231749b0ef2e8b259c4b20a91f68a95af9b4cd3d4884d69d

          SHA512

          d0435f9072c83d3518c8e14544318b86461dc53132db06073ce56a9b95ca2afd2d43231657bfce909f6d821ba5d9d7779bb3291eed681c2eb0fe105bfc22ba51

        • C:\Users\Admin\AppData\Local\Temp\hurok.exe

          Filesize

          1KB

          MD5

          829984de45aafe680eb9766631bdaf7d

          SHA1

          41b0c2f8b517d1c2b517ba5cc4299ba7d35b2e14

          SHA256

          6a9eb28d7c8d2d0ff883db4d99afc8a0c3460aeab5e5c47018961fe61298af45

          SHA512

          1564f1740ad67245509771f56ba1d8fdc6e49fa63e99403a9cc5fac9dbc0c96c21cf5f9a2afcbd146d9242b03d24b2b32f09790bd2f469a5f8d89a7d20fdc4be

        • \Users\Admin\AppData\Local\Temp\hurok.exe

          Filesize

          13KB

          MD5

          58f4e847b7c530999f5cb77c493f3353

          SHA1

          37bc038668be6b2d28e0502ffe54807f8b132930

          SHA256

          fa1607f328635b9d2d9f6e5f8cea4cae8e7c5345ed3d8640ea19b17f72a7280b

          SHA512

          267c005659dfe40a0009a23b088f65fedd5346491fc89b5ca6e3be9db7a736bd0c96d6d9d491d59334a0b9ca59893787f918c3e4789d0871beb53af182efd630

        • memory/1228-23-0x0000000000330000-0x0000000000336000-memory.dmp

          Filesize

          24KB

        • memory/2128-1-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/2128-8-0x00000000002B0000-0x00000000002B6000-memory.dmp

          Filesize

          24KB

        • memory/2128-0-0x00000000002B0000-0x00000000002B6000-memory.dmp

          Filesize

          24KB