Analysis
-
max time kernel
137s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 14:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-26_3a7f7fe7b22634722751617b49d5767f_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-26_3a7f7fe7b22634722751617b49d5767f_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-26_3a7f7fe7b22634722751617b49d5767f_cryptolocker.exe
-
Size
45KB
-
MD5
3a7f7fe7b22634722751617b49d5767f
-
SHA1
200741f093dc0691ca0e8af81f61300ae5355c09
-
SHA256
5e1136d96490ad50f0bf89fdd2a9b28809971a7b359b6aa61b34113d0724e4e8
-
SHA512
7dbf1db1d81ad8a68a455dae28d6c0df9078260d3f38702f112c20c3b5e16e6bfafc12e1d3c411bd6432e01ee44a4041a140327d339c5e9938a5f2062113ce9a
-
SSDEEP
768:Kf1K2exg2kBwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZsBGGpebVIYLHA3KxG:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XL
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x0006000000022f42-12.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral2/files/0x0006000000022f42-12.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 2024-05-26_3a7f7fe7b22634722751617b49d5767f_cryptolocker.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation hurok.exe -
Executes dropped EXE 1 IoCs
pid Process 548 hurok.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 448 wrote to memory of 548 448 2024-05-26_3a7f7fe7b22634722751617b49d5767f_cryptolocker.exe 82 PID 448 wrote to memory of 548 448 2024-05-26_3a7f7fe7b22634722751617b49d5767f_cryptolocker.exe 82 PID 448 wrote to memory of 548 448 2024-05-26_3a7f7fe7b22634722751617b49d5767f_cryptolocker.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_3a7f7fe7b22634722751617b49d5767f_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-26_3a7f7fe7b22634722751617b49d5767f_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD502c24830f1e52e33b7d373a6192a83e8
SHA1d7d9b335638a6e015935f2bc428172efa681ac85
SHA25650f212b160dae1992d50d5e9e51cbe96d2cd8eb82a7e2bdf3fbe39140e1d0ae7
SHA5121704478ddf5eb5d190194d53a40bcccbd28235b2f681131ea3815d4dfe6bd5116bcf8df4d3e758084cfa83e7a5dd8be27818e3c3db71767cc84a87a1405de422