Analysis
-
max time kernel
88s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 17:51
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-25_5af23067b325980de6dda8aed7fc678a_cryptolocker.exe
Resource
win7-20231215-en
General
-
Target
2024-01-25_5af23067b325980de6dda8aed7fc678a_cryptolocker.exe
-
Size
63KB
-
MD5
5af23067b325980de6dda8aed7fc678a
-
SHA1
8a6113eef6a3c9ec476dbc5e1ae6ce1b85f77789
-
SHA256
64ce0d56f00643d26eb19b585406ef679f8710adbb3f735b917d3f5f1732f5ee
-
SHA512
7cb6f200d1fdbf5504496069bdb50561f9edfd14422980d27527216f8396b0d09f5b56338ea8e1c43b2085571f4b7b86ef1b7aa4d1018694bb94dde88160ef4f
-
SSDEEP
1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1x/9lfL+gniDSA96:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7Q
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x00080000000231fe-12.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral2/files/0x00080000000231fe-12.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation hurok.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 2024-01-25_5af23067b325980de6dda8aed7fc678a_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 5544 hurok.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3428 wrote to memory of 5544 3428 2024-01-25_5af23067b325980de6dda8aed7fc678a_cryptolocker.exe 88 PID 3428 wrote to memory of 5544 3428 2024-01-25_5af23067b325980de6dda8aed7fc678a_cryptolocker.exe 88 PID 3428 wrote to memory of 5544 3428 2024-01-25_5af23067b325980de6dda8aed7fc678a_cryptolocker.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_5af23067b325980de6dda8aed7fc678a_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_5af23067b325980de6dda8aed7fc678a_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:5544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD5d74284258bcb5e2a521c02cb0dc474a2
SHA1136934fba18c510d6f096de7638cf0501883ea2e
SHA2569682d1614b93654f462630ee83b2bdc579088fa155c81d21e299e38b2d77d388
SHA512233822a7d5c42169a284e7c74e2b401b451f24568632e16e39ef54de9aa003ba1f5a2a69c6dbeb8cd100d5b977667fcde8a16764353b46b8b24c8fecb8d83f4f