Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-04-2024 00:59
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-23_b7d0586fa0930727a392a6e831aa310e_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-23_b7d0586fa0930727a392a6e831aa310e_cryptolocker.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-23_b7d0586fa0930727a392a6e831aa310e_cryptolocker.exe
-
Size
50KB
-
MD5
b7d0586fa0930727a392a6e831aa310e
-
SHA1
1d7db160340d894ba19b6db96f8f04fb0a04f8f7
-
SHA256
66fa189e305e0c41c1608530ca43ac695a63794a4f5c8b35181896724ef8dc8c
-
SHA512
b980c077e631fecdc2dfb779b34dbb308209812995515065fd6853452dfee2437bb6ca415b7869032e1faba91d7e3728f913e29cebca98b282238c54c4fafff0
-
SSDEEP
1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1xzpAIm:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7x
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x00080000000122cd-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x00080000000122cd-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 1200 hurok.exe -
Loads dropped DLL 1 IoCs
pid Process 2780 2024-04-23_b7d0586fa0930727a392a6e831aa310e_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2780 2024-04-23_b7d0586fa0930727a392a6e831aa310e_cryptolocker.exe 1200 hurok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2780 wrote to memory of 1200 2780 2024-04-23_b7d0586fa0930727a392a6e831aa310e_cryptolocker.exe 28 PID 2780 wrote to memory of 1200 2780 2024-04-23_b7d0586fa0930727a392a6e831aa310e_cryptolocker.exe 28 PID 2780 wrote to memory of 1200 2780 2024-04-23_b7d0586fa0930727a392a6e831aa310e_cryptolocker.exe 28 PID 2780 wrote to memory of 1200 2780 2024-04-23_b7d0586fa0930727a392a6e831aa310e_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-23_b7d0586fa0930727a392a6e831aa310e_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-23_b7d0586fa0930727a392a6e831aa310e_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD52f3cfc434f89d68cd7888e6799c28508
SHA11ce801902f941ca55c3ed73f7c797928bfe6f6ce
SHA2565802f19196f4d0876955cdfc789f5ef61c50a2e940b6d56bdcd0caba048d12ba
SHA51240ecd271770cbb1cd87019e186df05792de4ab33d350bd44764d88c6c42bb0a5f52b4d17675e1922ab3ade0440c1307b9b136847ea2f369097ff1553441b36a7