Analysis
-
max time kernel
87s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 04:01
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-14_875f86613f4d999a295aee9ccdcdea0e_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-14_875f86613f4d999a295aee9ccdcdea0e_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-14_875f86613f4d999a295aee9ccdcdea0e_cryptolocker.exe
-
Size
49KB
-
MD5
875f86613f4d999a295aee9ccdcdea0e
-
SHA1
a4e5b3fd8c8bbb79fbca72a48b94181ec877d061
-
SHA256
388602da09825b91525ec6bf5770a975ecc1f5cc7d77bab7a7e5258ef38df011
-
SHA512
1cef82560b3bf79b79b67cdb6a1d448a5ea7585bae62da0db9ff46bd8b4b93dc6ffb0e1831bd850b131c3aa407f4ccfdf929031265510e4d845a65d818c0944d
-
SSDEEP
1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1xzpAI3:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7E
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023213-12.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023213-12.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation 2024-02-14_875f86613f4d999a295aee9ccdcdea0e_cryptolocker.exe Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation hurok.exe -
Executes dropped EXE 1 IoCs
pid Process 5056 hurok.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3724 wrote to memory of 5056 3724 2024-02-14_875f86613f4d999a295aee9ccdcdea0e_cryptolocker.exe 84 PID 3724 wrote to memory of 5056 3724 2024-02-14_875f86613f4d999a295aee9ccdcdea0e_cryptolocker.exe 84 PID 3724 wrote to memory of 5056 3724 2024-02-14_875f86613f4d999a295aee9ccdcdea0e_cryptolocker.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-14_875f86613f4d999a295aee9ccdcdea0e_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-14_875f86613f4d999a295aee9ccdcdea0e_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:5056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD53eb54678791bd7e4cb0fdadd05fbdcd9
SHA12c3c48463673f4f3c37756311b4c78c6f831297f
SHA2565503039eeb103af9c8afb9e8dbb6acc30dddfa1a9cd4e93a5f64644845a2d2c6
SHA512130b84546935d4183ab02f04b8db2033ffd909f1782048ac250fc00deb220a638ed7d5e0c6c114f0c018d1a3855484f9f25344c7901b6bcd3914d7d9fc977cbd
-
Filesize
1KB
MD5da313dde715c72369e4edf6836f83cbb
SHA125c9fc0b6d1736a5bff0ace02697986f54ec9330
SHA256e1f7149f1eda0da19369a9cac0f064dda0278c04ab54c260a6d078819108e6a4
SHA512eaa22953ce8d747b714e4eb954209fe1b33cb11a7b2d1963a261f15c1790e5e8762db2a271e36ee96e2691041e7a94984404a840d3e5ee392c2d14411d2e1317