Analysis
-
max time kernel
141s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 15:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-22_b2085fb78bd52712e084f95b33b103b1_cryptolocker.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-07-22_b2085fb78bd52712e084f95b33b103b1_cryptolocker.exe
Resource
win10v2004-20240709-en
General
-
Target
2024-07-22_b2085fb78bd52712e084f95b33b103b1_cryptolocker.exe
-
Size
68KB
-
MD5
b2085fb78bd52712e084f95b33b103b1
-
SHA1
f6488bc1c631fc730d7924192087ccf7cf2154a4
-
SHA256
e80c748fc51e5bdfd16a80808d2440a3a952d5915392a641ac1555f50dca1885
-
SHA512
aff503f418f3b4b3ad554fce97d07d8cc8477338ef6b4e63629237119478c816557fe688b941c150ae4e5a11845947c9d66402be01e9b6a0ef473e84f2fa6735
-
SSDEEP
1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszudnYTjipvF293vaRLER:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7J
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation 2024-07-22_b2085fb78bd52712e084f95b33b103b1_cryptolocker.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation hurok.exe -
Executes dropped EXE 1 IoCs
pid Process 4780 hurok.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3692 wrote to memory of 4780 3692 2024-07-22_b2085fb78bd52712e084f95b33b103b1_cryptolocker.exe 85 PID 3692 wrote to memory of 4780 3692 2024-07-22_b2085fb78bd52712e084f95b33b103b1_cryptolocker.exe 85 PID 3692 wrote to memory of 4780 3692 2024-07-22_b2085fb78bd52712e084f95b33b103b1_cryptolocker.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-22_b2085fb78bd52712e084f95b33b103b1_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-22_b2085fb78bd52712e084f95b33b103b1_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:4780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD57bd699585892ac10e42c384ea0955a12
SHA154c577bc9b2247661e0e1eb7f005882052ebf50f
SHA256d44bb4e49ee0020c40812c4ef8776ea0cced67d0890dab3ef1dc733b5c0134cc
SHA512aecc9f693e1acb657448cdc9d17afcd594b3b16d8c2d3ea7cbaf8db00067abc092f14dcf2b43dfc5fe8d1749afaa03b29b4216998eb5bbabc174fdad1ae9eb34