Analysis

  • max time kernel
    91s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/03/2024, 17:27

General

  • Target

    2024-03-28_1269b0a80291e460e96141da7a8c0456_cryptolocker.exe

  • Size

    35KB

  • MD5

    1269b0a80291e460e96141da7a8c0456

  • SHA1

    848ba8f56c9eef7b5686d02f19e9a6e18e7f19ee

  • SHA256

    5b31286ce4e76c84b0acdbb59ce4f5430dd2a26650381a593333ba66f8f3ffd2

  • SHA512

    5191764e1b2b0f17aefcad985b23545baef9193ab3317fcb405f7e9c59887040b6d5f806802816a888f3d29fdf923a37d62763adfa8693ac4f6ab93e435c68bc

  • SSDEEP

    768:Kf1K2exg2kBwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZsBGGp/YIm7wm6:o1KhxqwtdgI2MyzNORQtOflIwoHNV2X9

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-28_1269b0a80291e460e96141da7a8c0456_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-28_1269b0a80291e460e96141da7a8c0456_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3268
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:4640

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\hurok.exe

          Filesize

          35KB

          MD5

          f175c91ede1514b58f792869a0bb8832

          SHA1

          e17375368055f181eade253ba1a7d7a73e8df776

          SHA256

          d2da0cf0440321f5adcc5b656b0911bbb8b6471e79a4d48a984fde766fceea00

          SHA512

          ad04b82951e80a570611c7ab7b088466def899d6506bd95b3c28fe563bc1827c7f2da3c04ac201d769a0f95124997674b24894eb19d9ea55fb1894698529cebf

        • memory/3268-0-0x00000000006E0000-0x00000000006E6000-memory.dmp

          Filesize

          24KB

        • memory/3268-1-0x00000000006E0000-0x00000000006E6000-memory.dmp

          Filesize

          24KB

        • memory/3268-2-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/4640-20-0x0000000000590000-0x0000000000596000-memory.dmp

          Filesize

          24KB