Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/04/2024, 03:37
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-24_33ab1c2f1dda4877568da2a6b5be7ea5_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-24_33ab1c2f1dda4877568da2a6b5be7ea5_cryptolocker.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-24_33ab1c2f1dda4877568da2a6b5be7ea5_cryptolocker.exe
-
Size
64KB
-
MD5
33ab1c2f1dda4877568da2a6b5be7ea5
-
SHA1
5a9e0087852040fa66b4ff96a904cbd4e4ee8bae
-
SHA256
7ec668b75adf1ace751a3923e71677d1ca4b413cea8150148e1544c0dd410238
-
SHA512
7aa4bee43ebaff1392325445039a0b100c5d694efa998aae762085b3f32279b4f4c83362f30a18a46fc4b91f27d25d1aee1c49fce574c5d4f2b06206f6dc3185
-
SSDEEP
1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszudnYTjipvF293Civ:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7d
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000a000000012255-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000a000000012255-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2216 hurok.exe -
Loads dropped DLL 1 IoCs
pid Process 1712 2024-04-24_33ab1c2f1dda4877568da2a6b5be7ea5_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1712 2024-04-24_33ab1c2f1dda4877568da2a6b5be7ea5_cryptolocker.exe 2216 hurok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2216 1712 2024-04-24_33ab1c2f1dda4877568da2a6b5be7ea5_cryptolocker.exe 28 PID 1712 wrote to memory of 2216 1712 2024-04-24_33ab1c2f1dda4877568da2a6b5be7ea5_cryptolocker.exe 28 PID 1712 wrote to memory of 2216 1712 2024-04-24_33ab1c2f1dda4877568da2a6b5be7ea5_cryptolocker.exe 28 PID 1712 wrote to memory of 2216 1712 2024-04-24_33ab1c2f1dda4877568da2a6b5be7ea5_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-24_33ab1c2f1dda4877568da2a6b5be7ea5_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-24_33ab1c2f1dda4877568da2a6b5be7ea5_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5dd3f366f0a1e51c8831f5319adc6e00f
SHA19b78485b40a3286a2231fd6909004c4d3c6e36aa
SHA25602781b8d3eadbcee0b2e1c606c95ae3fb55e486827b423db236c21a685dc9a56
SHA5122697637293cf1ad0e359a27e65861cb1155fef3ea0e349663290975b3445fd020a9e9a9297b9824bc69f755a94e2120c75c3222ee5db3fc1f6a0c08020839e64