Analysis
-
max time kernel
94s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2024, 04:36
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-05_7d446e5c7063a3e3d7bc33b1d30e0539_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-06-05_7d446e5c7063a3e3d7bc33b1d30e0539_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-06-05_7d446e5c7063a3e3d7bc33b1d30e0539_cryptolocker.exe
-
Size
66KB
-
MD5
7d446e5c7063a3e3d7bc33b1d30e0539
-
SHA1
eebc54e9c1558613ff6bd6502fc6cf20f7efb3da
-
SHA256
b7b267d2bcdd71825231d4f6079d90b9473b996590a7310c68a3e65a630a7597
-
SHA512
3cf6545b9c89b0cf0eb78742da0eed0fd7a6ba1c285cb9855c5ccc303969a8558ad312dc15dd6f235df61bbe1f6f60e5658487158d19ba657774da526a6471a5
-
SSDEEP
1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1x/9lfL+gniDScGO:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7n
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x0006000000023286-12.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral2/files/0x0006000000023286-12.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation 2024-06-05_7d446e5c7063a3e3d7bc33b1d30e0539_cryptolocker.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation hurok.exe -
Executes dropped EXE 1 IoCs
pid Process 2988 hurok.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 800 wrote to memory of 2988 800 2024-06-05_7d446e5c7063a3e3d7bc33b1d30e0539_cryptolocker.exe 82 PID 800 wrote to memory of 2988 800 2024-06-05_7d446e5c7063a3e3d7bc33b1d30e0539_cryptolocker.exe 82 PID 800 wrote to memory of 2988 800 2024-06-05_7d446e5c7063a3e3d7bc33b1d30e0539_cryptolocker.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-05_7d446e5c7063a3e3d7bc33b1d30e0539_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-05_7d446e5c7063a3e3d7bc33b1d30e0539_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:2988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5504dc99860c1543b7d496320f892c900
SHA1c117c46a94db00d43c9db86b3fb9f3c7bc1364ec
SHA25614f992c2390230bea2fe2785a0944c109c2005e9bc1718c7bd828b149bb5b4c7
SHA512ea527cf2b7287cacc8cd0e56b356c44ce1b5be7398a4eacdb5692a21ac86c6cd872527623c750b4922bdf108dc496e02783bcf71a10d5b4fc2643017e76a53fc