Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04-07-2024 15:57
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-04_4721360a953d6e4cebc77d4609841501_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-07-04_4721360a953d6e4cebc77d4609841501_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-07-04_4721360a953d6e4cebc77d4609841501_cryptolocker.exe
-
Size
66KB
-
MD5
4721360a953d6e4cebc77d4609841501
-
SHA1
aed8cc48d788e2c888bea80017d06e20cb68df75
-
SHA256
9cd360c3cec504c4eec60b9f3621fc19a1c904b24ea960aae74de3d6f6845d56
-
SHA512
5df2beecd2ce02c52b830a22c5fbd284b293ef667e7936db880f256feb1c23ae754ba1d88492325468fd054c8589f683c2818d831800a6b53d690e068821f2d7
-
SSDEEP
1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszudnYTjipvF293W4:aq7tdgI2MyzNORQtOflIwoHNV2XBFV73
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 2024-07-04_4721360a953d6e4cebc77d4609841501_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 620 hurok.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3716 wrote to memory of 620 3716 2024-07-04_4721360a953d6e4cebc77d4609841501_cryptolocker.exe 81 PID 3716 wrote to memory of 620 3716 2024-07-04_4721360a953d6e4cebc77d4609841501_cryptolocker.exe 81 PID 3716 wrote to memory of 620 3716 2024-07-04_4721360a953d6e4cebc77d4609841501_cryptolocker.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_4721360a953d6e4cebc77d4609841501_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-04_4721360a953d6e4cebc77d4609841501_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Executes dropped EXE
PID:620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5e3785abac086a786c0475ea868dd5892
SHA19ebf1bbb074df7a3636aa5ba69fd7225087cfe4c
SHA25617241f85071dc2e7e1c48867de197500b7054a63a524a92396957ea9f666fe50
SHA512bed887c686c3412a8c259ed6a4ac08d0a35c97e52fe68205436fd8c71c9bade50ef32c9f6416f2e6351bf80be10b03e161b229c47294f84bfaae3bf929f3ef13