Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-05-2024 02:21

General

  • Target

    2024-05-05_739c377f72a4da329d9acd7b3a14b45f_cryptolocker.exe

  • Size

    30KB

  • MD5

    739c377f72a4da329d9acd7b3a14b45f

  • SHA1

    d7deac08d46c5b966decb654afa59bdd612594ec

  • SHA256

    1147391fe9f8620caa5574d8989e6356ec6eafc0aba9a71cb0f82a6a5cc14792

  • SHA512

    19f530978d3ae35a6e5b9536ae118bfa01e05679a1f7a0af54008699bbfb8ab109758d42819dc90ad44ae10f8b0e03473334bf359900eada882bdbae57513b9e

  • SSDEEP

    768:Kf1K2exg2kBwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZsBGGbNAKSjNf8:o1KhxqwtdgI2MyzNORQtOflIwoHNV2X5

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-05_739c377f72a4da329d9acd7b3a14b45f_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-05_739c377f72a4da329d9acd7b3a14b45f_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3968
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:4192

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    30KB

    MD5

    63824704e7b3061cc06dc6cb24745e5f

    SHA1

    837838536f8240296c1564eac7ece82d18bd24dc

    SHA256

    e860b7ec33e3b6ba5c5a89ae8c0c4dfef3d48faeb32701faf3512c587e681d07

    SHA512

    4ca0d427110b53ecbb40dba57f88071625b58ade713b2d55c1b7715caae1c0a083da639b0ccde3145eda62ea114c2496cd3331ec349fa189b46fb97f2c08d25d

  • memory/3968-0-0x0000000000590000-0x0000000000596000-memory.dmp

    Filesize

    24KB

  • memory/3968-1-0x0000000000590000-0x0000000000596000-memory.dmp

    Filesize

    24KB

  • memory/3968-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/4192-25-0x00000000004C0000-0x00000000004C6000-memory.dmp

    Filesize

    24KB