Analysis

  • max time kernel
    89s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/01/2024, 05:36

General

  • Target

    2024-01-28_c53b41a6c7285cdfa9e38aa5b803ee18_cryptolocker.exe

  • Size

    62KB

  • MD5

    c53b41a6c7285cdfa9e38aa5b803ee18

  • SHA1

    f757ba719ff408c8fe70fb4eadd37a483f157ea1

  • SHA256

    2a01dd83c8ffbdce5c38ef434944c532bf02a8e79c3b0e49eff38a5121990693

  • SHA512

    a7fdcdc7f299e4288c8ef61183681b9dce15bf3233387992f06a67cd08b940fa6bf9d1a2f3b69b1dfa948c0ae9c7af575467b38a3d64647a874d53135e4a05c1

  • SSDEEP

    1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1x/9lfL+gniDScMo:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7h

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-28_c53b41a6c7285cdfa9e38aa5b803ee18_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-28_c53b41a6c7285cdfa9e38aa5b803ee18_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1868
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:3820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    62KB

    MD5

    7d75a6704455940017e0d6fd1a0a0b51

    SHA1

    deb9d0f5c67d452ab8c8be850b627d61da206a5d

    SHA256

    b682ea689f51aa25b1dbe19cecb683aaf523783cc5dfa0ac558967e19a9fbf76

    SHA512

    b5e36c555d8d91909ed008da633e32c9eb7724cd61b808e39854d569ee60b6e06ae504ac5cd3e46eef88e881d3be703a43c8186e075c4cfc72fe0c753e5c9b1c

  • memory/1868-0-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/1868-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/1868-1-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/3820-25-0x00000000020D0000-0x00000000020D6000-memory.dmp

    Filesize

    24KB