Analysis
-
max time kernel
144s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2024, 11:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-20_722ef3939a0262c9b3b1b933d536c086_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-20_722ef3939a0262c9b3b1b933d536c086_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-20_722ef3939a0262c9b3b1b933d536c086_cryptolocker.exe
-
Size
63KB
-
MD5
722ef3939a0262c9b3b1b933d536c086
-
SHA1
d725dd80dc24b63401eb1ed39e2c029d26b90e0a
-
SHA256
34c8bb519aa551ad6e4ce65ca8ce52a0e63c3257486d66c1d464fcfb6ea24be6
-
SHA512
0b2f0e8946b8aa0f3c1663462f15c501febcf522bd30a8f1489f15fcf873c795d0a3c2efa70865641f3ca69a0a9aabcaba4776a59ca7db356d23998357b6a6ec
-
SSDEEP
1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszudnYTjipvF29984Z:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7V
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x000800000002325a-14.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral2/files/0x000800000002325a-14.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2024-04-20_722ef3939a0262c9b3b1b933d536c086_cryptolocker.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation hurok.exe -
Executes dropped EXE 1 IoCs
pid Process 5000 hurok.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1304 wrote to memory of 5000 1304 2024-04-20_722ef3939a0262c9b3b1b933d536c086_cryptolocker.exe 92 PID 1304 wrote to memory of 5000 1304 2024-04-20_722ef3939a0262c9b3b1b933d536c086_cryptolocker.exe 92 PID 1304 wrote to memory of 5000 1304 2024-04-20_722ef3939a0262c9b3b1b933d536c086_cryptolocker.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-20_722ef3939a0262c9b3b1b933d536c086_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-20_722ef3939a0262c9b3b1b933d536c086_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4036 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:81⤵PID:3324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD5187833a698ad252ed3b1f513cdb0fa90
SHA1a7e3a390c65922ce5da221ef6a0c6f7131e3cc1d
SHA2561252339e9f74ba98a87a2debb8eb4c09ca730e14f55a54beeb429b33b0be7cb1
SHA512a761c13318b994223e7d6e2012b9ab8cbba9be5eaca39d88aaa4e6a270d8ff7e4f32e33a66d791c9a0e12e60b51ca00aabb5facb49ae089f761387ddd4829bf2