Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-08-2024 07:59

General

  • Target

    2024-08-29_dae5f1fe31b7e255a810ffe34237312b_cryptolocker.exe

  • Size

    69KB

  • MD5

    dae5f1fe31b7e255a810ffe34237312b

  • SHA1

    c02f8e06bec75d823c82c49f6765e27e13ba6095

  • SHA256

    229bdca5ed7088cbb35b68f2fb852a1e40d7960da5e69751d30381c5920f65fd

  • SHA512

    879c2688c142a153649c10f298d4f132c8dc9aa510b932357f6446cb38cd4596fa283d6dae9893fdea5404057a736408e063ecc57cfc1b9d3969beb44d5d8f91

  • SSDEEP

    1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszudnYTjipvF299N2UYK:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7N

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-08-29_dae5f1fe31b7e255a810ffe34237312b_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-08-29_dae5f1fe31b7e255a810ffe34237312b_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1076
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    69KB

    MD5

    f7ef990cc3c4a34482ec9bc67922a745

    SHA1

    7f82506deaa26ac67c5750e2e5006d48a4690d6b

    SHA256

    e978e02fedc908f788bb11abfd67033856de937dff90cc00013afc669f41e776

    SHA512

    15e4ba113f58d51fb036389bb17a3369be013ac483a7c7c4252b749cb4ca62ba9394c37f7c07e287540b9df1b3489e1b5bf36b148164f7f0093a68413e4a9d97

  • memory/1076-0-0x0000000002200000-0x0000000002206000-memory.dmp

    Filesize

    24KB

  • memory/1076-1-0x0000000002200000-0x0000000002206000-memory.dmp

    Filesize

    24KB

  • memory/1076-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/1960-19-0x00000000021C0000-0x00000000021C6000-memory.dmp

    Filesize

    24KB