Analysis

  • max time kernel
    145s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/01/2024, 16:24

General

  • Target

    2024-01-26_335e44bed44cafcbb2d96b0bad9b685d_cryptolocker.exe

  • Size

    63KB

  • MD5

    335e44bed44cafcbb2d96b0bad9b685d

  • SHA1

    e52c24c83b0e393a9e905627da8038db81a352ce

  • SHA256

    5ae9da2e7c28d65a8de302ea31ea4c46de1b1490468e6a0858470674b9d4292d

  • SHA512

    ab00645028c92594ed8fba52a8fb5401ba1afe6bf3632f6e17bdc9fb0ba9326e5e153dbc648964d70addf3e1c4669ea092725b46ae3e4dcfd283d16ba6e65667

  • SSDEEP

    1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1x/9lfL+gniDSA9E:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7m

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-26_335e44bed44cafcbb2d96b0bad9b685d_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-26_335e44bed44cafcbb2d96b0bad9b685d_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2060
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:1664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    64KB

    MD5

    20bf190c91d41b4477120ebe7d163108

    SHA1

    cc2802c76d906d04bad834d466a0f3f13ef5984e

    SHA256

    593f284fdeaf64253d9fa51b2cf61591331746f2dbcdea2eec2e24443a3bc240

    SHA512

    805fdb1bb2a48b96233909b54603530049a1ca8549a9b4dec7537533ce5063bd7579c3e43a89337969c201374a9b07f9ed21b7441da3b58c6089842b67277a82

  • memory/2060-0-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/2060-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/2060-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB