Analysis
-
max time kernel
138s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/04/2024, 02:56
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-25_d917020a3d1a49012badf59da9d8b8a6_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-25_d917020a3d1a49012badf59da9d8b8a6_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-25_d917020a3d1a49012badf59da9d8b8a6_cryptolocker.exe
-
Size
64KB
-
MD5
d917020a3d1a49012badf59da9d8b8a6
-
SHA1
1dc8b213adefdf34d76819e79181286c12189156
-
SHA256
9910dbdec1d211cb9da8cf46820c8603e1e02af9c1ba1694c6cc637c84bfd655
-
SHA512
d43128195d495b6fcba7262fcd5c812455a86171b9eb1d382d4d269d80495ac86e9eaf5e96e2b8bf8344c4bc94009f5a863eec86c33d2cb9b4704adb45a8768b
-
SSDEEP
1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszudnYTjipvF293Ci3:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7V
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000d00000001224c-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000d00000001224c-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2892 hurok.exe -
Loads dropped DLL 1 IoCs
pid Process 2768 2024-04-25_d917020a3d1a49012badf59da9d8b8a6_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2768 2024-04-25_d917020a3d1a49012badf59da9d8b8a6_cryptolocker.exe 2892 hurok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2768 wrote to memory of 2892 2768 2024-04-25_d917020a3d1a49012badf59da9d8b8a6_cryptolocker.exe 28 PID 2768 wrote to memory of 2892 2768 2024-04-25_d917020a3d1a49012badf59da9d8b8a6_cryptolocker.exe 28 PID 2768 wrote to memory of 2892 2768 2024-04-25_d917020a3d1a49012badf59da9d8b8a6_cryptolocker.exe 28 PID 2768 wrote to memory of 2892 2768 2024-04-25_d917020a3d1a49012badf59da9d8b8a6_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_d917020a3d1a49012badf59da9d8b8a6_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-25_d917020a3d1a49012badf59da9d8b8a6_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD539dfbdc44ecab5054406baa1e8d380e9
SHA11e6b12f606106ace304aadace558d0f08483f09b
SHA256e268c9ff21283c5dc5164bc4a6a271a2b993083efce9790f919dc2657b284d65
SHA512ac48f6fa4a4281188831e573fc825694eb93c30bb39d5cbc176cb88c7fc787aa4a6965fa41e828ca0a041d94f1710a8a9983366f6138fb6244a71f4fcb019ec6