Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/04/2024, 01:00

General

  • Target

    2024-04-30_c51cb3194f4eb2e9fbd2320ebfc996b5_cryptolocker.exe

  • Size

    64KB

  • MD5

    c51cb3194f4eb2e9fbd2320ebfc996b5

  • SHA1

    571a12a9523fc48b5cad6ebb3c76f9c218ed3eef

  • SHA256

    930db356202b0f1b795cc7f64d7b06d755d199ff4ff4db1324f57de53d29a430

  • SHA512

    6e5b6bdb2e85516c5d5b09029b0c4eb7914e94115314df5f0a60e922b88808a699355b139303b6bd47a9b2b375a8624a0e0dfb4dcffd8f58c87af780a73924bb

  • SSDEEP

    1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszudnYTjipvF299d:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7V

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-30_c51cb3194f4eb2e9fbd2320ebfc996b5_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-30_c51cb3194f4eb2e9fbd2320ebfc996b5_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:5056
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Executes dropped EXE
      PID:4600

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\hurok.exe

          Filesize

          64KB

          MD5

          8c92860dae563db488a9ed40ac003e6f

          SHA1

          b00017c20e503c6b25be31ba029e2ce25e5a3177

          SHA256

          59ca2eb7274703d3f240bd181a2a37694d1c37340e3ae8dd82658cabfa74decf

          SHA512

          cf22264698a023b73be530826d8d9f1ea71adca72bc3b9c1134206ff1ce782506952439ec02a9593fbc1e8237162a62925795bc348b0f43b1bb6dd8cc2b0ed73

        • memory/4600-25-0x0000000000560000-0x0000000000566000-memory.dmp

          Filesize

          24KB

        • memory/5056-0-0x0000000000580000-0x0000000000586000-memory.dmp

          Filesize

          24KB

        • memory/5056-1-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/5056-8-0x0000000000580000-0x0000000000586000-memory.dmp

          Filesize

          24KB