Analysis
-
max time kernel
139s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/02/2024, 14:36
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-18_727584a589cee1c561c3f2ccb108de6d_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-18_727584a589cee1c561c3f2ccb108de6d_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-18_727584a589cee1c561c3f2ccb108de6d_cryptolocker.exe
-
Size
62KB
-
MD5
727584a589cee1c561c3f2ccb108de6d
-
SHA1
68b433d9f871d5b5fc38c3b43be4ed76f2c0bbfa
-
SHA256
cdae91ddc322e438c907425abe815289d055b32a6656db7a8e1cfc9f70005a0c
-
SHA512
2a9349f5c316d472d1cc672405d5ba049e9f9eb83477192d58210aff895d07b0c18cd1a7ee86d0870ce78e3a12e8d254882c545e84a188fa4832374ba3203963
-
SSDEEP
1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszudnYTjipvF299SQj:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7N
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023201-12.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023201-12.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation 2024-02-18_727584a589cee1c561c3f2ccb108de6d_cryptolocker.exe Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation hurok.exe -
Executes dropped EXE 1 IoCs
pid Process 3712 hurok.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1448 wrote to memory of 3712 1448 2024-02-18_727584a589cee1c561c3f2ccb108de6d_cryptolocker.exe 84 PID 1448 wrote to memory of 3712 1448 2024-02-18_727584a589cee1c561c3f2ccb108de6d_cryptolocker.exe 84 PID 1448 wrote to memory of 3712 1448 2024-02-18_727584a589cee1c561c3f2ccb108de6d_cryptolocker.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-18_727584a589cee1c561c3f2ccb108de6d_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-18_727584a589cee1c561c3f2ccb108de6d_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:3712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD5aadc42f6cc51fabe033abacf9491f8fa
SHA1dcc47d3b6d43810ffa6becdf3c425d76e390cc88
SHA256beb32e4b5bded518a0280c627d5a9caf54738f2f23e4ad5a097a30a396796eb6
SHA512a658f990a20c405b2a3c40956f38b75303e5d75386599041df147a851a52ca3107e94abab3b3a3209a27fbdc3c813d29709678ff709b0bdc54d24e5046e425c5