Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 07:10
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-26_db51f8f3def2116167981f1451fb6264_cryptolocker.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-08-26_db51f8f3def2116167981f1451fb6264_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-26_db51f8f3def2116167981f1451fb6264_cryptolocker.exe
-
Size
54KB
-
MD5
db51f8f3def2116167981f1451fb6264
-
SHA1
8ae21d54eaf6559a10f10eb2f453d171448fa183
-
SHA256
833c779440ff7aa1186013cdc93852db60745799c72720ea61c25670dbeba822
-
SHA512
660b5449d4dd07b8ff9923eb7fbb4486768d2862f3997a93ae8db24491ae17f5d1dae85f5cea85d3ee66eadaf2cdd5829eec25f9feb8bf08838bc8b05a75d342
-
SSDEEP
1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1xzpAI4kjmb:aq7tdgI2MyzNORQtOflIwoHNV2XBFV77
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2152 hurok.exe -
Loads dropped DLL 1 IoCs
pid Process 1728 2024-08-26_db51f8f3def2116167981f1451fb6264_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-26_db51f8f3def2116167981f1451fb6264_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hurok.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1728 2024-08-26_db51f8f3def2116167981f1451fb6264_cryptolocker.exe 2152 hurok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2152 1728 2024-08-26_db51f8f3def2116167981f1451fb6264_cryptolocker.exe 30 PID 1728 wrote to memory of 2152 1728 2024-08-26_db51f8f3def2116167981f1451fb6264_cryptolocker.exe 30 PID 1728 wrote to memory of 2152 1728 2024-08-26_db51f8f3def2116167981f1451fb6264_cryptolocker.exe 30 PID 1728 wrote to memory of 2152 1728 2024-08-26_db51f8f3def2116167981f1451fb6264_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-26_db51f8f3def2116167981f1451fb6264_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-26_db51f8f3def2116167981f1451fb6264_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD53ec52956d6c2989adb6376ce3a5e1525
SHA15895679d5bbdbf63c1ab359f1467b339f001c36b
SHA25687bc501534d3e23741bf87a515b2bf23fc48bdb466c654a4328d48e1bde2ef87
SHA5121a0828705f021076a50ee7a6b869b8946138dd1135b0d2906262a6f8c66de2f89f3e48d5567cb7542f981b18633e3c9ae7d38a3e2e8fac68fa9cbe863091add5