Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    09-08-2024 16:42

General

  • Target

    2024-08-09_1482fe226f183e8e28b53baee2e6e3d6_cryptolocker.exe

  • Size

    40KB

  • MD5

    1482fe226f183e8e28b53baee2e6e3d6

  • SHA1

    3ed22d399f96d7329e3ac8d23120639bf6752847

  • SHA256

    d1ba9b0a0c31dd933ff179dbde92be688c0394f56450856719531856e642d545

  • SHA512

    5b181b05f9c6240f23761604aecb2bdbcfc02218d4cf5f102c00cdd59ede60f6c69c0b55ec80b6161904c89a7f6c124bbdb46b925a6c82e07c500a9ab0bad892

  • SSDEEP

    768:Kf1K2exg2kBwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZsBGGp/YIm7wm0Upap:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-08-09_1482fe226f183e8e28b53baee2e6e3d6_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-08-09_1482fe226f183e8e28b53baee2e6e3d6_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of UnmapMainImage
      PID:2116

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    40KB

    MD5

    4e213edc6752954272995d5b86ffe8ab

    SHA1

    af9e8d7a511fe7bb1724672ba865d80ef5164fde

    SHA256

    7e6cc0a45439dbf8e6c41a20d8eafcb8989ab8cbe82b8864f65e1f9e0ba006d6

    SHA512

    ab17818e38e9d4d3d45acc1ff7020621a348fba2faadbe19265fdd59e0b9395edd51713383564205df7a3d330c099f8f183837a5063f676632d4d308d745873a

  • memory/2116-23-0x0000000000230000-0x0000000000236000-memory.dmp

    Filesize

    24KB

  • memory/2240-0-0x0000000000310000-0x0000000000316000-memory.dmp

    Filesize

    24KB

  • memory/2240-8-0x0000000000310000-0x0000000000316000-memory.dmp

    Filesize

    24KB

  • memory/2240-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB