Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 19:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-20_5361b9d673bf58dafdf517fc1d97a177_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-20_5361b9d673bf58dafdf517fc1d97a177_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-20_5361b9d673bf58dafdf517fc1d97a177_cryptolocker.exe
-
Size
52KB
-
MD5
5361b9d673bf58dafdf517fc1d97a177
-
SHA1
db6519b030c01f29aa78538b35df60e62814f5c9
-
SHA256
c28fee11d1562f0bf83a66e6b4c12e66fb82fbb9845d9168f7da6c2020ddda4a
-
SHA512
0e1848d774583b98e43989071021db705feb28fb95289e13868748e33632498ed3fdbe45ff1834e3061960c6b320e1f5b7192c5acaa24d27aaa7931800756290
-
SSDEEP
1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1xzpAI49w:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7q
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000c000000012671-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000c000000012671-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 840 hurok.exe -
Loads dropped DLL 1 IoCs
pid Process 1800 2024-05-20_5361b9d673bf58dafdf517fc1d97a177_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1800 2024-05-20_5361b9d673bf58dafdf517fc1d97a177_cryptolocker.exe 840 hurok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1800 wrote to memory of 840 1800 2024-05-20_5361b9d673bf58dafdf517fc1d97a177_cryptolocker.exe 28 PID 1800 wrote to memory of 840 1800 2024-05-20_5361b9d673bf58dafdf517fc1d97a177_cryptolocker.exe 28 PID 1800 wrote to memory of 840 1800 2024-05-20_5361b9d673bf58dafdf517fc1d97a177_cryptolocker.exe 28 PID 1800 wrote to memory of 840 1800 2024-05-20_5361b9d673bf58dafdf517fc1d97a177_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-20_5361b9d673bf58dafdf517fc1d97a177_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-20_5361b9d673bf58dafdf517fc1d97a177_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD5ed8c7cfa75cbb9ea860ba32ed9b23675
SHA117d8c11f9fed38f60595de2bc6d2b61b24cf5152
SHA2566e17ff9973ffe4d6428789b2a48e8abeeffc4c78e3f3c0406967b2d1017e5853
SHA5128f069182ce63bd9a7d7a76edee6eafe9e99c88c5f1d36c44aa32e6c8c8ab6f911cdf0b4dfeb233faf959979c8580189b91e1b49897bc024810fe8b19553dc0f1