Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:45
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-19_eb45764008e84988786e04d65eaa6558_cryptolocker.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-19_eb45764008e84988786e04d65eaa6558_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-19_eb45764008e84988786e04d65eaa6558_cryptolocker.exe
-
Size
68KB
-
MD5
eb45764008e84988786e04d65eaa6558
-
SHA1
35f1b344789fb2e44ae1b1b9d370cd89100ce719
-
SHA256
d4d82b82d9804958e88d9f3e412009f7c1548bff93813123226321ddd5bbd258
-
SHA512
161159ebf1851e61deab20ec2de3a272b30bee1ee4df491d873dc49f67ec42a6405819bd07a33d17720e1546b39a0a8b2b0b24ab0984c1e90c4628b08e9e63ed
-
SSDEEP
1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszudnYTjipvF293vaRLEA:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7Y
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2760 hurok.exe -
Loads dropped DLL 1 IoCs
pid Process 2200 2024-09-19_eb45764008e84988786e04d65eaa6558_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-19_eb45764008e84988786e04d65eaa6558_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hurok.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2200 2024-09-19_eb45764008e84988786e04d65eaa6558_cryptolocker.exe 2760 hurok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2760 2200 2024-09-19_eb45764008e84988786e04d65eaa6558_cryptolocker.exe 30 PID 2200 wrote to memory of 2760 2200 2024-09-19_eb45764008e84988786e04d65eaa6558_cryptolocker.exe 30 PID 2200 wrote to memory of 2760 2200 2024-09-19_eb45764008e84988786e04d65eaa6558_cryptolocker.exe 30 PID 2200 wrote to memory of 2760 2200 2024-09-19_eb45764008e84988786e04d65eaa6558_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-19_eb45764008e84988786e04d65eaa6558_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-19_eb45764008e84988786e04d65eaa6558_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD5e433a18f5c2b0708597cd83cb084d8a1
SHA1d8ac8b5df8c1331fe7ead18bba59290c820e7c9a
SHA2563967b10967585d405a220313dad33b9bb7a095d4de13093b4c2473ad8c657395
SHA51280c9419df760f5657145bf365cda12a0e23518a18e43e3bb8ab725700da3811a8d003ce9ad6723ed89c1e349c1f641156f7bca177cfb8cdf1ea07e5947c6eeb5