Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    20/05/2024, 19:32

General

  • Target

    2024-05-20_5361b9d673bf58dafdf517fc1d97a177_cryptolocker.exe

  • Size

    52KB

  • MD5

    5361b9d673bf58dafdf517fc1d97a177

  • SHA1

    db6519b030c01f29aa78538b35df60e62814f5c9

  • SHA256

    c28fee11d1562f0bf83a66e6b4c12e66fb82fbb9845d9168f7da6c2020ddda4a

  • SHA512

    0e1848d774583b98e43989071021db705feb28fb95289e13868748e33632498ed3fdbe45ff1834e3061960c6b320e1f5b7192c5acaa24d27aaa7931800756290

  • SSDEEP

    1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1xzpAI49w:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7q

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-20_5361b9d673bf58dafdf517fc1d97a177_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-20_5361b9d673bf58dafdf517fc1d97a177_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1800
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:840

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\hurok.exe

          Filesize

          52KB

          MD5

          ed8c7cfa75cbb9ea860ba32ed9b23675

          SHA1

          17d8c11f9fed38f60595de2bc6d2b61b24cf5152

          SHA256

          6e17ff9973ffe4d6428789b2a48e8abeeffc4c78e3f3c0406967b2d1017e5853

          SHA512

          8f069182ce63bd9a7d7a76edee6eafe9e99c88c5f1d36c44aa32e6c8c8ab6f911cdf0b4dfeb233faf959979c8580189b91e1b49897bc024810fe8b19553dc0f1

        • memory/840-23-0x00000000002B0000-0x00000000002B6000-memory.dmp

          Filesize

          24KB

        • memory/1800-0-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB

        • memory/1800-1-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/1800-8-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB