Analysis
-
max time kernel
134s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 22:00
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-22_fb712f8fd059549e426f8a65f59e814f_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-22_fb712f8fd059549e426f8a65f59e814f_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-22_fb712f8fd059549e426f8a65f59e814f_cryptolocker.exe
-
Size
53KB
-
MD5
fb712f8fd059549e426f8a65f59e814f
-
SHA1
ea20058c5726f48bb8d35747426f5d1065754f3e
-
SHA256
f2a8aeabfdef36b6943d4cd7e364e59035840b5aaf4b3bb1418fab7e4239d1a1
-
SHA512
d0b17d598c54a739b28f21153173357ff2bb4dd59626a80a27c4f05db08914506e1035773836fbbd19e7d7fa36d5d93550e0a1edf3b4573bebcf659465480f48
-
SSDEEP
1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1xzpAIKx61:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7S
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\hurok.exe CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\hurok.exe CryptoLocker_set1 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
2024-05-22_fb712f8fd059549e426f8a65f59e814f_cryptolocker.exehurok.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 2024-05-22_fb712f8fd059549e426f8a65f59e814f_cryptolocker.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation hurok.exe -
Executes dropped EXE 1 IoCs
Processes:
hurok.exepid process 4396 hurok.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
2024-05-22_fb712f8fd059549e426f8a65f59e814f_cryptolocker.exedescription pid process target process PID 5040 wrote to memory of 4396 5040 2024-05-22_fb712f8fd059549e426f8a65f59e814f_cryptolocker.exe hurok.exe PID 5040 wrote to memory of 4396 5040 2024-05-22_fb712f8fd059549e426f8a65f59e814f_cryptolocker.exe hurok.exe PID 5040 wrote to memory of 4396 5040 2024-05-22_fb712f8fd059549e426f8a65f59e814f_cryptolocker.exe hurok.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_fb712f8fd059549e426f8a65f59e814f_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-22_fb712f8fd059549e426f8a65f59e814f_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:4396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD58af44a268fec2a0d6224000edf9a3297
SHA133c4985359abc7ef64b756e1c1eed01b6c5c01da
SHA25647f411572511c87fcf1fdfa981b296a0d9f3eedaf9358643baede198e0f8c2da
SHA512cde0cfaea5d00bbb9063f6a0a4439f87f4b0576307ec345f1b03398c9ad04c4d06dd32a22d0a9e631e0a4837ac2791d32ac8eb996b79576a9ab75dfaced17149