Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    04-05-2024 20:26

General

  • Target

    2024-05-04_3f90aab4fdb30c7927f339d14d1b5e84_cryptolocker.exe

  • Size

    36KB

  • MD5

    3f90aab4fdb30c7927f339d14d1b5e84

  • SHA1

    4ff3caa8629bc78b68b96fc5359e12f063a7c72c

  • SHA256

    188df6f3dde722f403acd4dfe3f9fb21189aeeb0a0b0b8e98e3a9e2f33c0c4d2

  • SHA512

    ba1c9971b96fb7c9a4e9eb49cca7ebf08358efc818e07501936d810a04768c436de96409a268643c6afb0863b5f5eab3beae430d42a090bd4bc0060d338835e4

  • SSDEEP

    768:Kf1K2exg2kBwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZsBGGp/YIm7wm0C:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XE

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-04_3f90aab4fdb30c7927f339d14d1b5e84_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-04_3f90aab4fdb30c7927f339d14d1b5e84_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2972
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2552

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    36KB

    MD5

    bb66502a25d9ac8335f30040eb9d61c6

    SHA1

    dc3ab7fde4a765ee23baabad154688994ee3141a

    SHA256

    15f05432fe56d5b0a3492b203fe6193a25ba5e1fc6b4e9c9a21c7bac2db81e40

    SHA512

    b2fc89bf3aa4b03a985a4d36e9143a95b08e9c421d73041241aada537e02ebd7fc9d755d3988840e8cb4284c94ebb5c165bb109e09a06022728c87d90ce2cc9b

  • memory/2552-23-0x00000000003D0000-0x00000000003D6000-memory.dmp

    Filesize

    24KB

  • memory/2972-0-0x00000000003C0000-0x00000000003C6000-memory.dmp

    Filesize

    24KB

  • memory/2972-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2972-8-0x00000000003C0000-0x00000000003C6000-memory.dmp

    Filesize

    24KB