Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
12-05-2024 14:58
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-12_fcb260ba297266999d70791abf704168_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-12_fcb260ba297266999d70791abf704168_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-12_fcb260ba297266999d70791abf704168_cryptolocker.exe
-
Size
30KB
-
MD5
fcb260ba297266999d70791abf704168
-
SHA1
9e266611f92ede22320232dae0ec500698af1f92
-
SHA256
295b55312853a88ae0fea4f507012d43c5a391b0467e5e7acc64a4262c0b4243
-
SHA512
e4dd274c49ebfb772fcafe8fcc0b1ea59c691049e4891eeb8b377d7816a45a32f44c7718663b00dff1dd0d3690d7b67edf681218b534e9048f357b62d291a884
-
SSDEEP
768:Kf1K2exg2kBwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZsBGGbNAKSjNfE:o1KhxqwtdgI2MyzNORQtOflIwoHNV2X5
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000d00000001226c-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000d00000001226c-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2092 hurok.exe -
Loads dropped DLL 1 IoCs
pid Process 2108 2024-05-12_fcb260ba297266999d70791abf704168_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2108 2024-05-12_fcb260ba297266999d70791abf704168_cryptolocker.exe 2092 hurok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2092 2108 2024-05-12_fcb260ba297266999d70791abf704168_cryptolocker.exe 28 PID 2108 wrote to memory of 2092 2108 2024-05-12_fcb260ba297266999d70791abf704168_cryptolocker.exe 28 PID 2108 wrote to memory of 2092 2108 2024-05-12_fcb260ba297266999d70791abf704168_cryptolocker.exe 28 PID 2108 wrote to memory of 2092 2108 2024-05-12_fcb260ba297266999d70791abf704168_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-12_fcb260ba297266999d70791abf704168_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-12_fcb260ba297266999d70791abf704168_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD581ccfc56af7eb72a96db4a0c1b692e1e
SHA17a9b6bb01f849565d2656f0eb850292cc09b95a4
SHA256ff575bc2be61b9be5a8cc457cb7d92580d1f0ffc7eb774e5ebbfc8fb38bbb938
SHA512ff958d4e457065fde94358e9896d6ff05d76d27d3081b96f8e6d2aa35c9cf9a94674dfab3ca41975377a5cc324621fabd5963d2617f630df4c093599c54f6c80