Analysis

  • max time kernel
    93s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/05/2024, 15:59

General

  • Target

    2024-05-21_cf3c162205fc2a081d815ccea7948ae7_cryptolocker.exe

  • Size

    65KB

  • MD5

    cf3c162205fc2a081d815ccea7948ae7

  • SHA1

    81cdc9b3f77ab884ebc0295809bd021e197a0be6

  • SHA256

    a50dd7ec6d1329477b4139cad641821eeac715d74f56ebf6cc059ea377cb1e10

  • SHA512

    10d0d23a07dba58f54b892de70dde059aca33ad7255f1da4fe054149548f82fe4dd6352c108998a61eb24ff21fc45cce8f7d2fbdf0ce0187832e58d06e6d509f

  • SSDEEP

    1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszudnYTjipvF29984E:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7o

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-21_cf3c162205fc2a081d815ccea7948ae7_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-21_cf3c162205fc2a081d815ccea7948ae7_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3564
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:5056

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\hurok.exe

          Filesize

          65KB

          MD5

          2e575e0b59a6dd2d3ffbeccbca073d0b

          SHA1

          5b3dec5ff38830a1f9954ff4812865269cb5f6cc

          SHA256

          237c6d6432a9bc41be2e4285a231c731ad2c7de59f3c73bd51a7a3901affb948

          SHA512

          3c5e838bbf0c6a9cae037c8c92d8b5af6a3fc698e200b767f4bce6b6d56e34470343d631b7b60061dc3da1c2affdb57b82f424189fa3e8c45e98d71ec458f2a5

        • memory/3564-0-0x00000000020C0000-0x00000000020C6000-memory.dmp

          Filesize

          24KB

        • memory/3564-1-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/3564-8-0x00000000020C0000-0x00000000020C6000-memory.dmp

          Filesize

          24KB

        • memory/5056-25-0x0000000000590000-0x0000000000596000-memory.dmp

          Filesize

          24KB