Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03-09-2024 09:41
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-03_03489c4793204fab2ff57d1e527f664b_cryptolocker.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-03_03489c4793204fab2ff57d1e527f664b_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-03_03489c4793204fab2ff57d1e527f664b_cryptolocker.exe
-
Size
56KB
-
MD5
03489c4793204fab2ff57d1e527f664b
-
SHA1
d7a7ca27910d432dfc18ef6e6d5dd5673275af5d
-
SHA256
95cf8fe9475f3023339f9085a9919668bf909815610563f13157db8116fad751
-
SHA512
c7c8adb6622ce73e43af9685e5994aaeb1414f96b78c1508a2759217a20c4c4e1ac1097732133c3e39594da6961f5bcb5eb9067c42bbb767109816e1f74cb4e7
-
SSDEEP
1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1xzpAIX6Ehh:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7q
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3068 hurok.exe -
Loads dropped DLL 1 IoCs
pid Process 2552 2024-09-03_03489c4793204fab2ff57d1e527f664b_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hurok.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-03_03489c4793204fab2ff57d1e527f664b_cryptolocker.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2552 2024-09-03_03489c4793204fab2ff57d1e527f664b_cryptolocker.exe 3068 hurok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2552 wrote to memory of 3068 2552 2024-09-03_03489c4793204fab2ff57d1e527f664b_cryptolocker.exe 30 PID 2552 wrote to memory of 3068 2552 2024-09-03_03489c4793204fab2ff57d1e527f664b_cryptolocker.exe 30 PID 2552 wrote to memory of 3068 2552 2024-09-03_03489c4793204fab2ff57d1e527f664b_cryptolocker.exe 30 PID 2552 wrote to memory of 3068 2552 2024-09-03_03489c4793204fab2ff57d1e527f664b_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-03_03489c4793204fab2ff57d1e527f664b_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-03_03489c4793204fab2ff57d1e527f664b_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5dd8e1121627767437471e59365881a7e
SHA1bd0f81fdd486b98a0a6ee6e263cb1361eebfa86d
SHA25619418bb5165313f7490f4bddd3d244e0c41a338d98d98726798632203142342e
SHA5125d9e83d14e63d721c520f239b9c6bac83ea5daccdea732b2edfcf53a99d796ea057f199a15da6728e762b83efff69ddd64ca818b4fd8d4b5555744be4daab1d2