Analysis

  • max time kernel
    142s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23/02/2024, 12:36

General

  • Target

    2024-02-23_561cdbdfde0a977dd7ccb2c184615b9e_cryptolocker.exe

  • Size

    63KB

  • MD5

    561cdbdfde0a977dd7ccb2c184615b9e

  • SHA1

    7a5e90e9440c08acc6c9f9aedf0448167e181582

  • SHA256

    ec12f5b6a9b92dc6a284609b14e7d194afc22a2b8f363db01506cfb975fbcdeb

  • SHA512

    6039ce6f35ef7ceac1275fa5a88a2b53a17fff9ff09a88c19bff08ccc1c447cbd5c7dcf677de0ee49b7bcfc0288791a1a768a07d1b089a796091701f952d8876

  • SSDEEP

    1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszudnYTjipvF299dh:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7T

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-23_561cdbdfde0a977dd7ccb2c184615b9e_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-23_561cdbdfde0a977dd7ccb2c184615b9e_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    63KB

    MD5

    d6d6cdd3eb574011171b30752010ef83

    SHA1

    6ca78852fea6aefbaf9cc2680bdb836c74bb9a87

    SHA256

    8ea082574c0d552fa45dd6a7bf96c8b5238b4f0f0c81952d58d548465949241b

    SHA512

    f45e7b4d4b986ef0edee1fd67435f60c9e6b5601fc7f8f643ecd76fc950cd4998531cfdf34c37357f6a3b499fa382c1aee0d24a64079c909d747e0bfcb56d9f2

  • memory/1968-0-0x0000000000310000-0x0000000000316000-memory.dmp

    Filesize

    24KB

  • memory/1968-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/1968-1-0x0000000000310000-0x0000000000316000-memory.dmp

    Filesize

    24KB

  • memory/2000-16-0x0000000000250000-0x0000000000256000-memory.dmp

    Filesize

    24KB