Analysis

  • max time kernel
    140s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/06/2024, 21:21

General

  • Target

    2024-06-05_3425616b8efbbed9e15648014d1181b0_cryptolocker.exe

  • Size

    53KB

  • MD5

    3425616b8efbbed9e15648014d1181b0

  • SHA1

    e9bd7a837321c4f1b1179d069566008df5ee6a46

  • SHA256

    1297fc17226621158b17e5bac224c3fcec7aaa7226e8f341be2bc8ca4c794198

  • SHA512

    fd7dd938990b8f0b44609b7e736b4b572424449d0bb19c06153a9fb7a1fcdd5e79e87a09657a12431c355ba682da338a4a74a735afdbb465493df0f9db698611

  • SSDEEP

    1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1xzpAIj:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7Y

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-05_3425616b8efbbed9e15648014d1181b0_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-05_3425616b8efbbed9e15648014d1181b0_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:940
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:4304

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\hurok.exe

          Filesize

          53KB

          MD5

          822f7854414d4baddc887252f157869f

          SHA1

          7754408fc3c641ebfbcb24b879007dc2415c5e21

          SHA256

          5b7aec0f88b97595178082576c9796374b4694cacaa291f91862e23992e58600

          SHA512

          80c2756501f90006c3b75e8a08c71cbeea732f0a2e37cb55b5c8a6f442acd360320a041651272e1eeb1998cbd950cd5801df5ca7240c891804a3b2e569e6a6f8

        • memory/940-0-0x00000000021D0000-0x00000000021D6000-memory.dmp

          Filesize

          24KB

        • memory/940-7-0x00000000021D0000-0x00000000021D6000-memory.dmp

          Filesize

          24KB

        • memory/940-1-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/4304-25-0x0000000000720000-0x0000000000726000-memory.dmp

          Filesize

          24KB