Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    17-02-2024 23:33

General

  • Target

    2024-02-17_95238c544af7dbaa94a6264fde1b22db_cryptolocker.exe

  • Size

    35KB

  • MD5

    95238c544af7dbaa94a6264fde1b22db

  • SHA1

    cbe328978e277039100c1c744ccf7b897254c6af

  • SHA256

    5ffe3b588f2b6f90f8a3a20a708eb26a10c0bad2b7e64cf198ce2a424319e587

  • SHA512

    63d1b02378ca5de5b79e5c3437756859245770b889155994e0e8756b170ed75ee37e364701b42495f4e0ad3bdda317ab147489e81a5f0ce08f7d07d5f645c988

  • SSDEEP

    768:Kf1K2exg2kBwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZsBGGp/YIm7wmkpD:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XP

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-17_95238c544af7dbaa94a6264fde1b22db_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-17_95238c544af7dbaa94a6264fde1b22db_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1200
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    35KB

    MD5

    e73ee8cdf4794698e22a0b2a06f09e05

    SHA1

    b676f1c84ecf794be4ed9555b6591691c5325450

    SHA256

    c4b96dcd51615036017b22adec7448a7b95e9eb8ba2b05c1903e787fbd3a4279

    SHA512

    48d2fa1698d08e25a85fdfead2145d50162ff469c5bbdc9fc3af21a75a648a95798b6a18fc4b4d83ce2aa8689870d414079a9e66283fe730848090fdd09873d1

  • memory/1200-0-0x0000000000310000-0x0000000000316000-memory.dmp

    Filesize

    24KB

  • memory/1200-1-0x0000000000310000-0x0000000000316000-memory.dmp

    Filesize

    24KB

  • memory/1200-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2744-17-0x0000000000230000-0x0000000000236000-memory.dmp

    Filesize

    24KB