Analysis
-
max time kernel
129s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 17:51
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-25_5af23067b325980de6dda8aed7fc678a_cryptolocker.exe
Resource
win7-20231215-en
General
-
Target
2024-01-25_5af23067b325980de6dda8aed7fc678a_cryptolocker.exe
-
Size
63KB
-
MD5
5af23067b325980de6dda8aed7fc678a
-
SHA1
8a6113eef6a3c9ec476dbc5e1ae6ce1b85f77789
-
SHA256
64ce0d56f00643d26eb19b585406ef679f8710adbb3f735b917d3f5f1732f5ee
-
SHA512
7cb6f200d1fdbf5504496069bdb50561f9edfd14422980d27527216f8396b0d09f5b56338ea8e1c43b2085571f4b7b86ef1b7aa4d1018694bb94dde88160ef4f
-
SSDEEP
1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1x/9lfL+gniDSA96:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7Q
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000c000000012327-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000c000000012327-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2384 hurok.exe -
Loads dropped DLL 1 IoCs
pid Process 1992 2024-01-25_5af23067b325980de6dda8aed7fc678a_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1992 2024-01-25_5af23067b325980de6dda8aed7fc678a_cryptolocker.exe 2384 hurok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2384 1992 2024-01-25_5af23067b325980de6dda8aed7fc678a_cryptolocker.exe 28 PID 1992 wrote to memory of 2384 1992 2024-01-25_5af23067b325980de6dda8aed7fc678a_cryptolocker.exe 28 PID 1992 wrote to memory of 2384 1992 2024-01-25_5af23067b325980de6dda8aed7fc678a_cryptolocker.exe 28 PID 1992 wrote to memory of 2384 1992 2024-01-25_5af23067b325980de6dda8aed7fc678a_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_5af23067b325980de6dda8aed7fc678a_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_5af23067b325980de6dda8aed7fc678a_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD5d74284258bcb5e2a521c02cb0dc474a2
SHA1136934fba18c510d6f096de7638cf0501883ea2e
SHA2569682d1614b93654f462630ee83b2bdc579088fa155c81d21e299e38b2d77d388
SHA512233822a7d5c42169a284e7c74e2b401b451f24568632e16e39ef54de9aa003ba1f5a2a69c6dbeb8cd100d5b977667fcde8a16764353b46b8b24c8fecb8d83f4f