Analysis
-
max time kernel
119s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2024, 09:49
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-01_f5befe0866315ca590c8f065a5278dfb_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-01_f5befe0866315ca590c8f065a5278dfb_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-01_f5befe0866315ca590c8f065a5278dfb_cryptolocker.exe
-
Size
42KB
-
MD5
f5befe0866315ca590c8f065a5278dfb
-
SHA1
688a2fa6afdc698351dd64733ad296523668259e
-
SHA256
b6e321f47f0ed6be795a98093bc4bb2d1b431337b17c7df094489cf7d81a1bbc
-
SHA512
10f5ea640dfed6a0ed1c309f3ea3b4371c5722e1fb5f55a30be797a86113fc5e3f6981aea74aa6cb2e348c3aa708bb98c8813403af498edaf4be77a62445ec20
-
SSDEEP
768:Kf1K2exg2kBwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZsBGGpebVIYLHA3Kxf:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XS
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x000c000000023157-12.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral2/files/0x000c000000023157-12.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 2024-02-01_f5befe0866315ca590c8f065a5278dfb_cryptolocker.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation hurok.exe -
Executes dropped EXE 1 IoCs
pid Process 804 hurok.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5068 wrote to memory of 804 5068 2024-02-01_f5befe0866315ca590c8f065a5278dfb_cryptolocker.exe 85 PID 5068 wrote to memory of 804 5068 2024-02-01_f5befe0866315ca590c8f065a5278dfb_cryptolocker.exe 85 PID 5068 wrote to memory of 804 5068 2024-02-01_f5befe0866315ca590c8f065a5278dfb_cryptolocker.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-01_f5befe0866315ca590c8f065a5278dfb_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-01_f5befe0866315ca590c8f065a5278dfb_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD5c6135dcf790a555371d0e8a7f6edc5c6
SHA1f84aa94a7a2bfb8e2f35615dbf4a403a8d5cbf20
SHA256c474c6437fb4226884a19e4f86185d90a9ba96fe87141641566ec09af1761d81
SHA51234f5359966116f52ee9bfa61481b9d17b5dad6a93b6cf1e3b95995d133cc44c7435bc39af1cab8501af7c9627d9ddc00f31596b477be0de449116bb81468b7ea