Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09/03/2024, 21:50

General

  • Target

    2024-03-09_b75ebe90199ddd3ab0020655a6d63a64_cryptolocker.exe

  • Size

    50KB

  • MD5

    b75ebe90199ddd3ab0020655a6d63a64

  • SHA1

    e0c18af35c2a2cbb65fad79fabfab564ab596989

  • SHA256

    da606f675980885b875eff6e4ac14f2f7189051b022ee9cf17bc73c7800b2f62

  • SHA512

    4fde6191b68456b0031affe57c0fca8903a85de7c561bf342d6c8293cf39accecf4a733a9d4f47dab1bdc12985d472b2df726dced5eb9bffdc4ad6ceaf78fb04

  • SSDEEP

    1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1xzpAIKxm:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7K

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-09_b75ebe90199ddd3ab0020655a6d63a64_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-09_b75ebe90199ddd3ab0020655a6d63a64_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:3032

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\hurok.exe

          Filesize

          50KB

          MD5

          790f16c01d6a19e43f65df94dde983ed

          SHA1

          c96be31d754b348e805d79c655b0cb1e3869b618

          SHA256

          8b9a8100d97503b6667a605d43e38af530c7b504e3791369c235b1c0e2001401

          SHA512

          b00a9998497576275f01ace400b72c814dacda46c5d5c61f6a58ccae2c7930a45986443288d6c45eeef5325a7428f79b603c849d2873e5f4567c744c46af9a63

        • memory/2012-1-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/2012-0-0x0000000000230000-0x0000000000236000-memory.dmp

          Filesize

          24KB

        • memory/2012-8-0x0000000000230000-0x0000000000236000-memory.dmp

          Filesize

          24KB

        • memory/3032-17-0x00000000001C0000-0x00000000001C6000-memory.dmp

          Filesize

          24KB