Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/05/2024, 04:10

General

  • Target

    2024-05-10_d2f3099bd86658116fe16784b16610b9_cryptolocker.exe

  • Size

    65KB

  • MD5

    d2f3099bd86658116fe16784b16610b9

  • SHA1

    bb711da4cf99491d6f49e2a2079ff40a82b3a7b7

  • SHA256

    ceb54e4353124e6be6982c3694245f8d4d3f574e1cc8fddb598236e74deb4363

  • SHA512

    a0d2303878075803c535f721583fdd64753d665c15a08b10d678c0062d3106e8c20e54d21956bc810b86513450eb460fde630a12785ef3665c06c8fd80388c5b

  • SSDEEP

    1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1x/9lfL+gniDScGw:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7N

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-10_d2f3099bd86658116fe16784b16610b9_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-10_d2f3099bd86658116fe16784b16610b9_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4668
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:3692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    65KB

    MD5

    30acb6e88bf41ddb5525fc6e5d876cbd

    SHA1

    c2b4b92d25b216b4447e0354863460067aca8b56

    SHA256

    6196a01c3150e05028e0b72945ddbb9ae05d47c04ce0b2670892fa92d45e464f

    SHA512

    73a3694250c62fbbf325a298baf292921edf8a6677d1c03590ff5e33b58f790187d4daa3af8954100f2f3b31e2866de9c66637272fb8a654d2d1e1d139579a34

  • memory/3692-25-0x0000000000620000-0x0000000000626000-memory.dmp

    Filesize

    24KB

  • memory/4668-0-0x0000000001FD0000-0x0000000001FD6000-memory.dmp

    Filesize

    24KB

  • memory/4668-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/4668-8-0x0000000001FD0000-0x0000000001FD6000-memory.dmp

    Filesize

    24KB