Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 12:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-09_a5f4d6a7f96584c59b215a478c0aa552_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-04-09_a5f4d6a7f96584c59b215a478c0aa552_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-09_a5f4d6a7f96584c59b215a478c0aa552_cryptolocker.exe
-
Size
42KB
-
MD5
a5f4d6a7f96584c59b215a478c0aa552
-
SHA1
bef33666c60b5a355858601883550c9fd9f4ce72
-
SHA256
6c1414f55995055f5a8325ef9d61c511953ece3a99df27694b6b38cc682f48c8
-
SHA512
f4487370602a674ba0c5fc714b4c100df7ea9780f3b947be37734855648cfc71456ded37c195708de9e2d9e33167fb8fe77611ae319172efc8a84f998f4ebdfe
-
SSDEEP
768:Kf1K2exg2kBwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZsBGGpebVIYLHA3KxG:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XD
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000b0000000139e0-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000b0000000139e0-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 852 hurok.exe -
Loads dropped DLL 1 IoCs
pid Process 1072 2024-04-09_a5f4d6a7f96584c59b215a478c0aa552_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1072 2024-04-09_a5f4d6a7f96584c59b215a478c0aa552_cryptolocker.exe 852 hurok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1072 wrote to memory of 852 1072 2024-04-09_a5f4d6a7f96584c59b215a478c0aa552_cryptolocker.exe 28 PID 1072 wrote to memory of 852 1072 2024-04-09_a5f4d6a7f96584c59b215a478c0aa552_cryptolocker.exe 28 PID 1072 wrote to memory of 852 1072 2024-04-09_a5f4d6a7f96584c59b215a478c0aa552_cryptolocker.exe 28 PID 1072 wrote to memory of 852 1072 2024-04-09_a5f4d6a7f96584c59b215a478c0aa552_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-09_a5f4d6a7f96584c59b215a478c0aa552_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-09_a5f4d6a7f96584c59b215a478c0aa552_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD5f8afbcb742cd864f661b964e1a2d5c70
SHA1d43ced7d7c44804b29b500d250f2c237f4ad3c3a
SHA256c5a986476db4136078fad2bf00483b6265ef35759873a8be1f4f40f00aa57822
SHA512f0cb188d0c90f864cd4cc623e8e4647d3e9f1a068e903dbae5c8f6190211d762a0ff4f2e401bf309acc2f19ac050b535ec31b2566cdde3045d6441004d9ecc92