Analysis

  • max time kernel
    86s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-02-2024 23:33

General

  • Target

    2024-02-17_95238c544af7dbaa94a6264fde1b22db_cryptolocker.exe

  • Size

    35KB

  • MD5

    95238c544af7dbaa94a6264fde1b22db

  • SHA1

    cbe328978e277039100c1c744ccf7b897254c6af

  • SHA256

    5ffe3b588f2b6f90f8a3a20a708eb26a10c0bad2b7e64cf198ce2a424319e587

  • SHA512

    63d1b02378ca5de5b79e5c3437756859245770b889155994e0e8756b170ed75ee37e364701b42495f4e0ad3bdda317ab147489e81a5f0ce08f7d07d5f645c988

  • SSDEEP

    768:Kf1K2exg2kBwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZsBGGp/YIm7wmkpD:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XP

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-17_95238c544af7dbaa94a6264fde1b22db_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-17_95238c544af7dbaa94a6264fde1b22db_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3936
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:1872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    35KB

    MD5

    e73ee8cdf4794698e22a0b2a06f09e05

    SHA1

    b676f1c84ecf794be4ed9555b6591691c5325450

    SHA256

    c4b96dcd51615036017b22adec7448a7b95e9eb8ba2b05c1903e787fbd3a4279

    SHA512

    48d2fa1698d08e25a85fdfead2145d50162ff469c5bbdc9fc3af21a75a648a95798b6a18fc4b4d83ce2aa8689870d414079a9e66283fe730848090fdd09873d1

  • memory/1872-21-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/3936-0-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/3936-1-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/3936-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB