Analysis

  • max time kernel
    134s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 22:00

General

  • Target

    2024-05-22_fb712f8fd059549e426f8a65f59e814f_cryptolocker.exe

  • Size

    53KB

  • MD5

    fb712f8fd059549e426f8a65f59e814f

  • SHA1

    ea20058c5726f48bb8d35747426f5d1065754f3e

  • SHA256

    f2a8aeabfdef36b6943d4cd7e364e59035840b5aaf4b3bb1418fab7e4239d1a1

  • SHA512

    d0b17d598c54a739b28f21153173357ff2bb4dd59626a80a27c4f05db08914506e1035773836fbbd19e7d7fa36d5d93550e0a1edf3b4573bebcf659465480f48

  • SSDEEP

    1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1xzpAIKx61:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7S

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-22_fb712f8fd059549e426f8a65f59e814f_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-22_fb712f8fd059549e426f8a65f59e814f_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:5040
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:4396

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    53KB

    MD5

    8af44a268fec2a0d6224000edf9a3297

    SHA1

    33c4985359abc7ef64b756e1c1eed01b6c5c01da

    SHA256

    47f411572511c87fcf1fdfa981b296a0d9f3eedaf9358643baede198e0f8c2da

    SHA512

    cde0cfaea5d00bbb9063f6a0a4439f87f4b0576307ec345f1b03398c9ad04c4d06dd32a22d0a9e631e0a4837ac2791d32ac8eb996b79576a9ab75dfaced17149

  • memory/4396-25-0x00000000005D0000-0x00000000005D6000-memory.dmp

    Filesize

    24KB

  • memory/5040-0-0x00000000020C0000-0x00000000020C6000-memory.dmp

    Filesize

    24KB

  • memory/5040-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/5040-8-0x00000000020C0000-0x00000000020C6000-memory.dmp

    Filesize

    24KB