Analysis

  • max time kernel
    88s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-02-2024 14:33

General

  • Target

    2024-02-04_9c4ee961d2deaa0a3cbcde152e96edd8_cryptolocker.exe

  • Size

    62KB

  • MD5

    9c4ee961d2deaa0a3cbcde152e96edd8

  • SHA1

    6485a05f8367e6f859249226fbb4513cd5f42e3f

  • SHA256

    86b4d45b152e55615698a578eb5fb76eccc56388e5d5fc29c78ed36757cec4d8

  • SHA512

    10c942b3e8d713540d145b84b8f8f0b77239e57593eaf582c1f7174a888c2f57e539594de5bc99a9540bda3b378072f7c8b81632f9c8b3180d7d3cfbe3cfcb31

  • SSDEEP

    1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszudnYTjipvF299d:aq7tdgI2MyzNORQtOflIwoHNV2XBFV71

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-04_9c4ee961d2deaa0a3cbcde152e96edd8_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-04_9c4ee961d2deaa0a3cbcde152e96edd8_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:6084
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:5752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    62KB

    MD5

    a1134e1ad4c869d0ad859a6688af3961

    SHA1

    118980c210c5946d32a744250c3ea360a2b8b7cb

    SHA256

    9d13f1712ca990628f2ae4f2cc792f9b344788d60e6a37b8f6cc7a284ccdf0e1

    SHA512

    a622d823669f7bf26d2b0df34a0dc6ef55a65fac54fac20e293af629b9183e75395373895ce2f81708feff7f1828ee71732bcfd001566937ff411cb8b60fe958

  • memory/5752-20-0x00000000005B0000-0x00000000005B6000-memory.dmp

    Filesize

    24KB

  • memory/6084-0-0x00000000005D0000-0x00000000005D6000-memory.dmp

    Filesize

    24KB

  • memory/6084-1-0x00000000005D0000-0x00000000005D6000-memory.dmp

    Filesize

    24KB

  • memory/6084-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB