Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22/04/2024, 08:28

General

  • Target

    2024-04-22_1106b8a40001847b508782978cd13b68_cryptolocker.exe

  • Size

    43KB

  • MD5

    1106b8a40001847b508782978cd13b68

  • SHA1

    c0519b8ddc6264b8d554dab12a1d34cfaaf0fa1f

  • SHA256

    56b65b83430e22abf02b8dccec745dbe24cbe0192d7b0b2e7524e4cc1af2b873

  • SHA512

    ddb340191174773c505bd4be41efaa4f162f627dac4a3386ecd61c0ac066b7c4738acced89f53d5578f447ea98b6a495bb2b399c616962c1c2b5d79149e3e4b2

  • SSDEEP

    768:Kf1K2exg2kBwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZsBGGpebVIYLHA3Kx6:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XP

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-22_1106b8a40001847b508782978cd13b68_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-22_1106b8a40001847b508782978cd13b68_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:3032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    43KB

    MD5

    15b58c275d7699fb30e004b3d92c7492

    SHA1

    d60f9d7c61a4205040a92631245b3222b32fe20e

    SHA256

    5e953ef33d198b98621f332967088c96918308e24f7bcc498147acb8456cd95d

    SHA512

    5cec71dea94dab0ae62d7e6c5587218d13c4f2cd6dcf128c4eda04ac60407507c63651d5d9c25ddf3cca7d4a71d30904552bfee4e5eb30e249b1bdadfeb1f6c4

  • memory/3032-18-0x00000000002B0000-0x00000000002B6000-memory.dmp

    Filesize

    24KB

  • memory/3068-0-0x0000000000230000-0x0000000000236000-memory.dmp

    Filesize

    24KB

  • memory/3068-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/3068-1-0x0000000000230000-0x0000000000236000-memory.dmp

    Filesize

    24KB