Analysis
-
max time kernel
89s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28/01/2024, 05:36
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-28_c53b41a6c7285cdfa9e38aa5b803ee18_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-28_c53b41a6c7285cdfa9e38aa5b803ee18_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-28_c53b41a6c7285cdfa9e38aa5b803ee18_cryptolocker.exe
-
Size
62KB
-
MD5
c53b41a6c7285cdfa9e38aa5b803ee18
-
SHA1
f757ba719ff408c8fe70fb4eadd37a483f157ea1
-
SHA256
2a01dd83c8ffbdce5c38ef434944c532bf02a8e79c3b0e49eff38a5121990693
-
SHA512
a7fdcdc7f299e4288c8ef61183681b9dce15bf3233387992f06a67cd08b940fa6bf9d1a2f3b69b1dfa948c0ae9c7af575467b38a3d64647a874d53135e4a05c1
-
SSDEEP
1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1x/9lfL+gniDScMo:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7h
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x000c000000023174-12.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral2/files/0x000c000000023174-12.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 2024-01-28_c53b41a6c7285cdfa9e38aa5b803ee18_cryptolocker.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation hurok.exe -
Executes dropped EXE 1 IoCs
pid Process 3820 hurok.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1868 wrote to memory of 3820 1868 2024-01-28_c53b41a6c7285cdfa9e38aa5b803ee18_cryptolocker.exe 88 PID 1868 wrote to memory of 3820 1868 2024-01-28_c53b41a6c7285cdfa9e38aa5b803ee18_cryptolocker.exe 88 PID 1868 wrote to memory of 3820 1868 2024-01-28_c53b41a6c7285cdfa9e38aa5b803ee18_cryptolocker.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-28_c53b41a6c7285cdfa9e38aa5b803ee18_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-28_c53b41a6c7285cdfa9e38aa5b803ee18_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:3820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD57d75a6704455940017e0d6fd1a0a0b51
SHA1deb9d0f5c67d452ab8c8be850b627d61da206a5d
SHA256b682ea689f51aa25b1dbe19cecb683aaf523783cc5dfa0ac558967e19a9fbf76
SHA512b5e36c555d8d91909ed008da633e32c9eb7724cd61b808e39854d569ee60b6e06ae504ac5cd3e46eef88e881d3be703a43c8186e075c4cfc72fe0c753e5c9b1c