Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-04-2024 04:16

General

  • Target

    2024-04-25_ff746224b17a75c716d89e2e116bcae3_cryptolocker.exe

  • Size

    64KB

  • MD5

    ff746224b17a75c716d89e2e116bcae3

  • SHA1

    1c6ebed4b11e752ebe9cd3e2109b36d23c14fea6

  • SHA256

    08f5431286a95ef52c4b9f4e15dcec84c2df587cafcba7eb7c762a7f74fa0007

  • SHA512

    102f7810931e804e3d325a7b7a2f0c67fa8f4a49b878e54379c13de84b09e78be760e61d1dd3e4cb6d4f5391fc9df51b1aef1aa5d8de350583d8b43e5e49212d

  • SSDEEP

    1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszudnYTjipvF299h:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7p

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-25_ff746224b17a75c716d89e2e116bcae3_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-25_ff746224b17a75c716d89e2e116bcae3_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2412
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    64KB

    MD5

    47c0e972bd03db777d114e6fd776a6e2

    SHA1

    39e7371ac2309c76d3a394d7dcb3ed9ae649083b

    SHA256

    cba7b341a9ac0c95c2b26d5f157bab5580f46ac66aed99c8ebad9df19a3c5f3a

    SHA512

    e60d39abe6a0b95b3026cd808a1af457da0d9fed76f966dc7efd07dcfeb831b45b9fff59cfc99a9929262485abaec951df664b288d27250308acbd287ca7f90a

  • memory/2412-0-0x00000000003C0000-0x00000000003C6000-memory.dmp

    Filesize

    24KB

  • memory/2412-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2412-8-0x00000000003C0000-0x00000000003C6000-memory.dmp

    Filesize

    24KB

  • memory/2748-23-0x00000000001C0000-0x00000000001C6000-memory.dmp

    Filesize

    24KB