Analysis
-
max time kernel
134s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2024 07:10
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-26_db51f8f3def2116167981f1451fb6264_cryptolocker.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-08-26_db51f8f3def2116167981f1451fb6264_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-26_db51f8f3def2116167981f1451fb6264_cryptolocker.exe
-
Size
54KB
-
MD5
db51f8f3def2116167981f1451fb6264
-
SHA1
8ae21d54eaf6559a10f10eb2f453d171448fa183
-
SHA256
833c779440ff7aa1186013cdc93852db60745799c72720ea61c25670dbeba822
-
SHA512
660b5449d4dd07b8ff9923eb7fbb4486768d2862f3997a93ae8db24491ae17f5d1dae85f5cea85d3ee66eadaf2cdd5829eec25f9feb8bf08838bc8b05a75d342
-
SSDEEP
1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1xzpAI4kjmb:aq7tdgI2MyzNORQtOflIwoHNV2XBFV77
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation 2024-08-26_db51f8f3def2116167981f1451fb6264_cryptolocker.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation hurok.exe -
Executes dropped EXE 1 IoCs
pid Process 3252 hurok.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-26_db51f8f3def2116167981f1451fb6264_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hurok.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 712 wrote to memory of 3252 712 2024-08-26_db51f8f3def2116167981f1451fb6264_cryptolocker.exe 84 PID 712 wrote to memory of 3252 712 2024-08-26_db51f8f3def2116167981f1451fb6264_cryptolocker.exe 84 PID 712 wrote to memory of 3252 712 2024-08-26_db51f8f3def2116167981f1451fb6264_cryptolocker.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-26_db51f8f3def2116167981f1451fb6264_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-26_db51f8f3def2116167981f1451fb6264_cryptolocker.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD53ec52956d6c2989adb6376ce3a5e1525
SHA15895679d5bbdbf63c1ab359f1467b339f001c36b
SHA25687bc501534d3e23741bf87a515b2bf23fc48bdb466c654a4328d48e1bde2ef87
SHA5121a0828705f021076a50ee7a6b869b8946138dd1135b0d2906262a6f8c66de2f89f3e48d5567cb7542f981b18633e3c9ae7d38a3e2e8fac68fa9cbe863091add5