Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/02/2024, 00:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-29_413b08ff5e09491c505d6ef00532696d_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-29_413b08ff5e09491c505d6ef00532696d_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-02-29_413b08ff5e09491c505d6ef00532696d_cryptolocker.exe
-
Size
49KB
-
MD5
413b08ff5e09491c505d6ef00532696d
-
SHA1
0dc4f10a13bac6d5bba659829d7220adf1b76bfb
-
SHA256
2d44a8ebc5e70f68e6d348d39e88e63330f9918321f79caa16aeb37deeca991c
-
SHA512
2889ff5b765cfde21dc550fd03fb4166dc0fa30295d20f78fc381e357baaf34392874b36cba271bf203231e26db6bd4491bb3f9f1c0e2e265a81151a1c4a8398
-
SSDEEP
1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1xzpAIKu:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7w
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000b00000001224f-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000b00000001224f-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2788 hurok.exe -
Loads dropped DLL 1 IoCs
pid Process 2020 2024-02-29_413b08ff5e09491c505d6ef00532696d_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2020 2024-02-29_413b08ff5e09491c505d6ef00532696d_cryptolocker.exe 2788 hurok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2788 2020 2024-02-29_413b08ff5e09491c505d6ef00532696d_cryptolocker.exe 28 PID 2020 wrote to memory of 2788 2020 2024-02-29_413b08ff5e09491c505d6ef00532696d_cryptolocker.exe 28 PID 2020 wrote to memory of 2788 2020 2024-02-29_413b08ff5e09491c505d6ef00532696d_cryptolocker.exe 28 PID 2020 wrote to memory of 2788 2020 2024-02-29_413b08ff5e09491c505d6ef00532696d_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-29_413b08ff5e09491c505d6ef00532696d_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-29_413b08ff5e09491c505d6ef00532696d_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD52f1e2abbba869896ac7ec1cb9e97a8ce
SHA1886a61f2afe335741c3de082a381a9edb0cb9b91
SHA256ac06c97e4940272315697c8ff1e936b955a9296d7c881785704873830a265d1b
SHA5127132f36a2bc44523650eb3f82cbfdca45af5cf1a6213086dbd39652d22d8bb67e6fc5f5f79641d72a5f914758136b82ec7a1c2181a83e2aaa5c444f08320209e