Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28-01-2024 03:22
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-28_0011a2471994e0a674e2400dbbcc73f5_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-28_0011a2471994e0a674e2400dbbcc73f5_cryptolocker.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-28_0011a2471994e0a674e2400dbbcc73f5_cryptolocker.exe
-
Size
43KB
-
MD5
0011a2471994e0a674e2400dbbcc73f5
-
SHA1
f69d56770d3a9e0ddfbab54267ca5908ee7a399b
-
SHA256
a59d4c667b761ad27a4131cbcc6855cac4d789f92042ed4fb8948ac60ef9ae28
-
SHA512
794fa41d1665cb8cc49a8a313e40dc07c74c1bd1b4611a79af184e2a39164da10fd3f841529cc20bbcb14ba7269999e10fa60bc73c890de8bab1541074a2c2ab
-
SSDEEP
768:Kf1K2exg2kBwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZsBGGpebVIYLHA3Kxu:o1KhxqwtdgI2MyzNORQtOflIwoHNV2Xr
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x0009000000015f01-13.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x0009000000015f01-13.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2160 hurok.exe -
Loads dropped DLL 1 IoCs
pid Process 1736 2024-01-28_0011a2471994e0a674e2400dbbcc73f5_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1736 2024-01-28_0011a2471994e0a674e2400dbbcc73f5_cryptolocker.exe 2160 hurok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2160 1736 2024-01-28_0011a2471994e0a674e2400dbbcc73f5_cryptolocker.exe 18 PID 1736 wrote to memory of 2160 1736 2024-01-28_0011a2471994e0a674e2400dbbcc73f5_cryptolocker.exe 18 PID 1736 wrote to memory of 2160 1736 2024-01-28_0011a2471994e0a674e2400dbbcc73f5_cryptolocker.exe 18 PID 1736 wrote to memory of 2160 1736 2024-01-28_0011a2471994e0a674e2400dbbcc73f5_cryptolocker.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-28_0011a2471994e0a674e2400dbbcc73f5_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-28_0011a2471994e0a674e2400dbbcc73f5_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2160
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD5f71fe86b429d8849568179ba3cdb26cf
SHA126f60a39e35789830d8ad60704b678c8314f82f1
SHA256e5c83dff276d2bf99856e2bd298a450401d124577dc9fa927c0d22692d2f63b5
SHA51271351b7e4aad0b598581605dd64784e88f5f511c5509c4a7127e71d99018e70343367fe873acb6ead9f62c6a834319cd3a5a11e7acfd059344db91b5f7c98813