Analysis

  • max time kernel
    141s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-03-2024 21:44

General

  • Target

    2024-03-09_93816c0ca69a14e9463e6c97023de6fc_cryptolocker.exe

  • Size

    63KB

  • MD5

    93816c0ca69a14e9463e6c97023de6fc

  • SHA1

    1b5da4f0b31ea70b52727216f4b41a56d272291e

  • SHA256

    1dda5f73300e1118b8767b99cd5c3536d32b4c6c5274adac5c6d1c075c3c0776

  • SHA512

    eba2215c2af9a7f7bad137019eae51d21b77e1d14dda4a0fec81474a1fccefd38e76afd346f5db7efbd6a0ffc5d66969d378cc35723a2a0b8eacfc08a97ef4ac

  • SSDEEP

    1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszudnYTjipvF293B8U:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7h

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-09_93816c0ca69a14e9463e6c97023de6fc_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-09_93816c0ca69a14e9463e6c97023de6fc_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1196
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:4756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    63KB

    MD5

    9d436ba1d1748c36958baa0097eaba0b

    SHA1

    45686ea4fec78e0972ee810beb95c0add5a5b9fe

    SHA256

    80726283321586d258eea8e80d6abe9b8f181ad104a19a1fc824bf367a3b25e9

    SHA512

    2df32999146a3b4e6cb3440f3669e7fa5c9128e954716fd54ebfe334fe474a8f2d0212c287bd65e6c394247ecf5bdefa64251f783f2ad68586160c69c772bbb6

  • memory/1196-0-0x0000000002260000-0x0000000002266000-memory.dmp

    Filesize

    24KB

  • memory/1196-1-0x0000000002260000-0x0000000002266000-memory.dmp

    Filesize

    24KB

  • memory/1196-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/4756-21-0x00000000004B0000-0x00000000004B6000-memory.dmp

    Filesize

    24KB