Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-04-2024 08:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-25_e0c29d15db4795dab4513c449bedd479_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-25_e0c29d15db4795dab4513c449bedd479_cryptolocker.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-25_e0c29d15db4795dab4513c449bedd479_cryptolocker.exe
-
Size
50KB
-
MD5
e0c29d15db4795dab4513c449bedd479
-
SHA1
fefd6016e49b900f3ce056ba557d43cf42cc8b3a
-
SHA256
4cf7d1fea0dcf2bc91ee3deb815b4a798250ddaea647a13759aff321c9c2810f
-
SHA512
c15ae9ad28e09a90b8a47384f0bdbcb6faf0c89e3ffe11cb35ffca4369c96df167f3956b3fcaa3371a43390f9d72b990ceb62feb28c75b6d9ef9456481776410
-
SSDEEP
1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1xzpAIr:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7Q
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x0009000000012247-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x0009000000012247-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 3016 hurok.exe -
Loads dropped DLL 1 IoCs
pid Process 2868 2024-04-25_e0c29d15db4795dab4513c449bedd479_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2868 2024-04-25_e0c29d15db4795dab4513c449bedd479_cryptolocker.exe 3016 hurok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2868 wrote to memory of 3016 2868 2024-04-25_e0c29d15db4795dab4513c449bedd479_cryptolocker.exe 28 PID 2868 wrote to memory of 3016 2868 2024-04-25_e0c29d15db4795dab4513c449bedd479_cryptolocker.exe 28 PID 2868 wrote to memory of 3016 2868 2024-04-25_e0c29d15db4795dab4513c449bedd479_cryptolocker.exe 28 PID 2868 wrote to memory of 3016 2868 2024-04-25_e0c29d15db4795dab4513c449bedd479_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_e0c29d15db4795dab4513c449bedd479_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-25_e0c29d15db4795dab4513c449bedd479_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD562d303540ddad9c9b9f68131b5f5b197
SHA12c699e6ef447ec04ca83276335237c32b5de460d
SHA256c059b534b4f8a3acb6669fbac6d6a52feccb6de68177b6fab3823ebf3b52102b
SHA51230999e9535c10f4212289440962e0abb580c274f2c0b39bbe327ed124f4acbddee9b8f4c60ea80bcb8314319e11df6899701ec5d16b9bb6b00cc8ab5f60ebfc2