Analysis

  • max time kernel
    135s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/05/2024, 08:30

General

  • Target

    2024-05-25_b6e6af0e4a0d7d80db75c0689926cece_cryptolocker.exe

  • Size

    52KB

  • MD5

    b6e6af0e4a0d7d80db75c0689926cece

  • SHA1

    04f6534d06add7584022106212c64c1e74d4cf20

  • SHA256

    4ccca25d2353f6b49ae459bc91f4a86e85b897d1a4e4c29abb8b7ae4c0ca492b

  • SHA512

    ab84397afd61e8396b64bd765c27f8251851a79be1acdee947bdef025fb9b66d93f992d1dfcd4bb27e10ebfe7d512a1863312275cb943f51bc2c49ccd4273d20

  • SSDEEP

    1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1xzpAIO:aq7tdgI2MyzNORQtOflIwoHNV2XBFV75

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-25_b6e6af0e4a0d7d80db75c0689926cece_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-25_b6e6af0e4a0d7d80db75c0689926cece_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3456
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:2980

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\hurok.exe

          Filesize

          52KB

          MD5

          ebd8bac48fb1f9d41c487a26a15f2c14

          SHA1

          9923d8fd9609a75646084702eed99a08db6ea138

          SHA256

          e5404e4b71ec034320a490a4388ffb00682b892be5ad0fbf9b8913268b8ab001

          SHA512

          e02bd4d6852396f6a52d8e397cf9d08101b13daf04ce38ab21cceb8572c9ac28f88dff3571505b40f55a8ac449342d5463fc1a3d80b02f569d36f2d938926229

        • memory/2980-25-0x0000000000550000-0x0000000000556000-memory.dmp

          Filesize

          24KB

        • memory/3456-0-0x00000000021C0000-0x00000000021C6000-memory.dmp

          Filesize

          24KB

        • memory/3456-1-0x00000000021C0000-0x00000000021C6000-memory.dmp

          Filesize

          24KB

        • memory/3456-2-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB