Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    27/05/2024, 21:41

General

  • Target

    2024-05-27_e1c4317d1dd629c646744b59c9917a91_cryptolocker.exe

  • Size

    53KB

  • MD5

    e1c4317d1dd629c646744b59c9917a91

  • SHA1

    bcf4846958516dceb587e643e34112ed4df1a175

  • SHA256

    ff112fd7a2986c00b27301184312d0991d9b2b9fa7ab97bf9690809a5e740b28

  • SHA512

    4fa315b70756f932d681809911d10165446e946861cafcd542bb8375b33fe5023f67f4e1fd80f4b78d72ced071eefbd91737077d2c49263908d60a3d15b88bc5

  • SSDEEP

    1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1xzpAI4kv:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7g

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-27_e1c4317d1dd629c646744b59c9917a91_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-27_e1c4317d1dd629c646744b59c9917a91_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1916
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2564

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\hurok.exe

          Filesize

          53KB

          MD5

          0657bf8a816d410705403fdbb220a80f

          SHA1

          0733cda8099631c8a929302af6d53783e9f159a8

          SHA256

          ce9a25619785ad4b369fe5ab923bd088e5d8b37a08cb5dec4fb5944c16e06c4d

          SHA512

          9945ba749d0f496152be9898dcad0c1f9fb2920b55cbc82beceffdad70bc0669742b5c7e247c12c9f7ec19c0f4098b09be68aefb2fae65fcedb925b204a36865

        • memory/1916-0-0x00000000002C0000-0x00000000002C6000-memory.dmp

          Filesize

          24KB

        • memory/1916-2-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/1916-1-0x00000000002C0000-0x00000000002C6000-memory.dmp

          Filesize

          24KB

        • memory/2564-23-0x00000000001C0000-0x00000000001C6000-memory.dmp

          Filesize

          24KB