Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    30/04/2024, 05:35

General

  • Target

    2024-04-30_d221099c03da774bea21255a2e8c5346_cryptolocker.exe

  • Size

    53KB

  • MD5

    d221099c03da774bea21255a2e8c5346

  • SHA1

    965865649fbdc1b750cd267275354ac6d62cedb0

  • SHA256

    9c634b3ae831e3d8078a840014a118db01b646b79849f121a4ed817fd09a61a1

  • SHA512

    50bda3eca6d84efda9c96a4793999eba031f5a170884d7a0f9a59165d9afac2f20bb040a2b0b240534edc8eff3c84442e9e2f89182fe0c7b02b922765ba346fc

  • SSDEEP

    1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1xzpAIKxp:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7d

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-30_d221099c03da774bea21255a2e8c5346_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-30_d221099c03da774bea21255a2e8c5346_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    53KB

    MD5

    dfce36358a878008516af6d33f64920e

    SHA1

    c6b9fc1f0ee18ac1a423094c2b52e164b1ac26ca

    SHA256

    c0d1eb4c6e63827fe0a806e1f424adb924f86657d1206ba6a81f83f99e7b40cf

    SHA512

    2614a7ee743b87107c09ca2e86c4e3843a819b8ee6336610254bb4d8f88e6c4fda1f5041e9543c08410b306a2c9a2e2b510b86ce23e2e18b886705d7d16e8f47

  • memory/2416-0-0x00000000001C0000-0x00000000001C6000-memory.dmp

    Filesize

    24KB

  • memory/2416-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2416-8-0x00000000001C0000-0x00000000001C6000-memory.dmp

    Filesize

    24KB

  • memory/2752-23-0x00000000002B0000-0x00000000002B6000-memory.dmp

    Filesize

    24KB