Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25/05/2024, 02:26

General

  • Target

    2024-05-25_1d073cd5d2b4e4abdbe6eaa248d290e8_cryptolocker.exe

  • Size

    30KB

  • MD5

    1d073cd5d2b4e4abdbe6eaa248d290e8

  • SHA1

    1471b256cb0f9d4042bfb8660cc5b9671b4e3561

  • SHA256

    160627e826bfdd586618cbbba1caf2b53b21a3c8848e9030f00870547723e61a

  • SHA512

    3e0b8dd3ad56b2f93aaeaca2b33624a5e2aeae6d8f939028eddb21102f9120f18e041be3452fdd47a1248d9bf173df198b80aa63f36cebd754de4124ca122de7

  • SSDEEP

    768:Kf1K2exg2kBwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZsBGGbNAKSjNfO:o1KhxqwtdgI2MyzNORQtOflIwoHNV2Xn

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-25_1d073cd5d2b4e4abdbe6eaa248d290e8_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-25_1d073cd5d2b4e4abdbe6eaa248d290e8_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1660
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    30KB

    MD5

    e6cad3ad766093f8cb8659758c2196ad

    SHA1

    1e0675abd421bfdbcf3244f076e8d4437710332d

    SHA256

    2cacb54b60f58eca75d6187fe2d88dcf00969d92e49c93a1b646af1f7747bd33

    SHA512

    38267d49499bf57d307767f832a7ce2f1be954d810c0c23d425dea70da7b98b5eaf6a79ccbee268cc62318269b566577286186791a05667b8ff47a131c926bcc

  • memory/1660-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/1660-8-0x00000000001C0000-0x00000000001C6000-memory.dmp

    Filesize

    24KB

  • memory/1660-0-0x00000000001C0000-0x00000000001C6000-memory.dmp

    Filesize

    24KB

  • memory/2932-23-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB