Analysis
-
max time kernel
138s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/02/2024, 20:23
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-18_06a99a76f97a40e87ecf2317f2d33af5_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-18_06a99a76f97a40e87ecf2317f2d33af5_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-18_06a99a76f97a40e87ecf2317f2d33af5_cryptolocker.exe
-
Size
44KB
-
MD5
06a99a76f97a40e87ecf2317f2d33af5
-
SHA1
a23ac1391fda6984d592c5d839ff14c43ea027df
-
SHA256
5bfe96b4d92d43c7d3b01c460f8dff113222175f64aefae2e1463bdae7ba388e
-
SHA512
1bf97be23222a8f01ca2d15f1f35a10a921598987ed97eaf4fbdeec26dea66e67cc316cff54b71b8715f6c02b28eb5bccd6371e7569a3bf9b12159ac420e9993
-
SSDEEP
768:Kf1K2exg2kBwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZsBGGpebVIYLHA3KxU:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XV
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023137-12.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023137-12.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 2024-02-18_06a99a76f97a40e87ecf2317f2d33af5_cryptolocker.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation hurok.exe -
Executes dropped EXE 1 IoCs
pid Process 2116 hurok.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4528 wrote to memory of 2116 4528 2024-02-18_06a99a76f97a40e87ecf2317f2d33af5_cryptolocker.exe 84 PID 4528 wrote to memory of 2116 4528 2024-02-18_06a99a76f97a40e87ecf2317f2d33af5_cryptolocker.exe 84 PID 4528 wrote to memory of 2116 4528 2024-02-18_06a99a76f97a40e87ecf2317f2d33af5_cryptolocker.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-18_06a99a76f97a40e87ecf2317f2d33af5_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-18_06a99a76f97a40e87ecf2317f2d33af5_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:2116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD577680241ef0b5cde44047daa2c40e31e
SHA1be19c64335cdd4c36130c346477f426369f785e6
SHA256f2f9f28eb1f148a90e39f5127efa89449e769787dc6d5417d10a29c2263668f6
SHA512a0e523457f906ccdd389ea6ff3f1bd39bfa2b34e246abd70516ae983e15e04cdfdefc40e19ea7f4f53e473634fcffe693f2bd46c4e29e80d9c463cd09c9a04c3