Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    05/05/2024, 14:41

General

  • Target

    2024-05-05_d7b039d80334aa3a2263163d23d8485d_cryptolocker.exe

  • Size

    44KB

  • MD5

    d7b039d80334aa3a2263163d23d8485d

  • SHA1

    eb93fe3ce00843b19efba334feab19e2c55e7dc5

  • SHA256

    aca75726d59fc216b9124cf7a43edb2390ae296bd51f0a80151a88b77d5182be

  • SHA512

    6050e8cbb20f7bdd08e02414eecde14984abe25d4aadb4cf88bdf8221b08686dae85db469ccd8df4a35dbe8633beda02a235ea281ea5f31301d4d93407eb14c4

  • SSDEEP

    768:Kf1K2exg2kBwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZsBGGpebVIYLHA3Kxz:o1KhxqwtdgI2MyzNORQtOflIwoHNV2Xm

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-05_d7b039d80334aa3a2263163d23d8485d_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-05_d7b039d80334aa3a2263163d23d8485d_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2908
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2496

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\hurok.exe

          Filesize

          44KB

          MD5

          dd7afb242505afb7c628bb73e7fde24c

          SHA1

          e098a3fc65a1d30c04d4ba727f5e2ee9b0a604aa

          SHA256

          1647432c59b70ff8c9aef04b13e4bcbf57958a42cee56cd7f2a8080d2cc3d25b

          SHA512

          29b537dcb5a20b04f5653a2c624cb188ad286ba9574294c7eab93110488930aa338d769edc09df418c24110f916ecc2884383275028666e9014f321f327fe0b6

        • memory/2496-23-0x00000000003C0000-0x00000000003C6000-memory.dmp

          Filesize

          24KB

        • memory/2908-0-0x0000000000230000-0x0000000000236000-memory.dmp

          Filesize

          24KB

        • memory/2908-1-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/2908-8-0x0000000000230000-0x0000000000236000-memory.dmp

          Filesize

          24KB