Analysis

  • max time kernel
    141s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 02:49

General

  • Target

    2024-05-22_c3c7f65bee3acfc90779855fb6e8f5ae_cryptolocker.exe

  • Size

    63KB

  • MD5

    c3c7f65bee3acfc90779855fb6e8f5ae

  • SHA1

    8ff359f76c48ac1f6ad6ff5d486e253f03d49334

  • SHA256

    e2f7ae9336474ccb55c486d7c9252835372a0d42dbaa338b08bc062725c5a56c

  • SHA512

    7a9b07d57509eafb50db6ca88a6b57e0643ffa306cac11d8efce594d587fe5307e5f28a0a82e19d87c18bde00ea75b447ec96839a2b4c0d7d3c6c78a0049d462

  • SSDEEP

    1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszudnYTjipvF293Wg:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7f

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-22_c3c7f65bee3acfc90779855fb6e8f5ae_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-22_c3c7f65bee3acfc90779855fb6e8f5ae_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1436
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:4544

Network

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hurok.exe
    Filesize

    63KB

    MD5

    3c3c5778efdcced25272e7fd50436c7e

    SHA1

    8292e1021862cbb80a38682cfa7d23471e75d222

    SHA256

    a18c6311215457aa63403f14bdcf399df3663be1c08f25dc42d50c228e8ca836

    SHA512

    7d59d7f3abd5bcd8c8d3e750dfeb3c2ad06da6cf741c28fe2dc7034d76d011aafe64ec354a7e97f5d910bd94d1683d59cf19ddeab04adccef0b560f6954fb18e

  • memory/1436-0-0x00000000020C0000-0x00000000020C6000-memory.dmp
    Filesize

    24KB

  • memory/1436-1-0x0000000000400000-0x0000000000406000-memory.dmp
    Filesize

    24KB

  • memory/1436-8-0x00000000020C0000-0x00000000020C6000-memory.dmp
    Filesize

    24KB

  • memory/4544-25-0x0000000000490000-0x0000000000496000-memory.dmp
    Filesize

    24KB