Analysis

  • max time kernel
    0s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12-01-2024 06:05

General

  • Target

    2024-01-11_b9ab2ffd5bae576fb74e709a8389645a_cryptolocker.exe

  • Size

    43KB

  • MD5

    b9ab2ffd5bae576fb74e709a8389645a

  • SHA1

    4165cdae0f054cfa6ab819859718accbab36b0d4

  • SHA256

    8eaf4053cfc3932702a510c645d7be83a14228c731d9da9a23d77fd3fc5715f9

  • SHA512

    9a7492875f02511c819952e5562e88980c9bdf49d4600d98e814b459076f27232ffe1213367479e56bb180e2af14b0a4cae7ce771c4cc95a3ebd016023459286

  • SSDEEP

    768:Kf1K2exg2kBwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZsBGGpebVIYLHA3Kx8:o1KhxqwtdgI2MyzNORQtOflIwoHNV2Xt

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\hurok.exe
    "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of UnmapMainImage
    PID:2308
  • C:\Users\Admin\AppData\Local\Temp\2024-01-11_b9ab2ffd5bae576fb74e709a8389645a_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-11_b9ab2ffd5bae576fb74e709a8389645a_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    43KB

    MD5

    b5207466ca0062e71035794b3eed41b9

    SHA1

    863b89ac5b9417b5d94b7ac111357f769a20fd65

    SHA256

    a21c99588a829ff92341d696aa4cf07bb16312c4a92bf341d26861f22db271ac

    SHA512

    969ab49c035575c6aaa6cbcd2dc1cdeb95cfc684cf61bb05af52c7939221042275a89e31c1e7d7bfcaa9dcec236d8915813b69efcbb2fb50b435e77736eb9048

  • C:\Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    36KB

    MD5

    3127e7d81cefd609ccc991aeeacef41e

    SHA1

    2cd014e45a71c96efd16fbfb2eabb3f04a9d374d

    SHA256

    b6e37b007462edf3eaf4f99fbdd49cc11f09e3a0f1f22fab61515bba80d9a3d9

    SHA512

    24293a92a7ccf0754245db9bb737f6e4dbc206b6c3b3a27e7089e0b5d1c17e4caf557d1d899be2d5b979fd6994e6fb43ee6a22c952c7e320e45a55759b86542d

  • memory/2308-17-0x00000000001C0000-0x00000000001C6000-memory.dmp

    Filesize

    24KB

  • memory/3064-8-0x0000000000230000-0x0000000000236000-memory.dmp

    Filesize

    24KB

  • memory/3064-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/3064-0-0x0000000000230000-0x0000000000236000-memory.dmp

    Filesize

    24KB