Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 14:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-19_a9fe5d552f24ec985517ad471ffcd69e_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-19_a9fe5d552f24ec985517ad471ffcd69e_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-19_a9fe5d552f24ec985517ad471ffcd69e_cryptolocker.exe
-
Size
39KB
-
MD5
a9fe5d552f24ec985517ad471ffcd69e
-
SHA1
7bef0cdefd8c13d7560565582e0b2d03f7272e7c
-
SHA256
66f78a5607bedbe6640e338d27964fb3722c876004c5874b1771814f51b32c72
-
SHA512
a92b3678465a91e41724197aab031b0a27bd0fac67d2ece471a5c2fcbad89db3c958ac82e08978aee9cb4e0e8a360fb79f573584629730b25eee07f71dcbac9b
-
SSDEEP
768:Kf1K2exg2kBwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZsBGGpebVIYLHA3Kx7:o1KhxqwtdgI2MyzNORQtOflIwoHNV2Xm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2752 hurok.exe -
Loads dropped DLL 1 IoCs
pid Process 2288 2024-09-19_a9fe5d552f24ec985517ad471ffcd69e_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-19_a9fe5d552f24ec985517ad471ffcd69e_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hurok.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2288 2024-09-19_a9fe5d552f24ec985517ad471ffcd69e_cryptolocker.exe 2752 hurok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2752 2288 2024-09-19_a9fe5d552f24ec985517ad471ffcd69e_cryptolocker.exe 30 PID 2288 wrote to memory of 2752 2288 2024-09-19_a9fe5d552f24ec985517ad471ffcd69e_cryptolocker.exe 30 PID 2288 wrote to memory of 2752 2288 2024-09-19_a9fe5d552f24ec985517ad471ffcd69e_cryptolocker.exe 30 PID 2288 wrote to memory of 2752 2288 2024-09-19_a9fe5d552f24ec985517ad471ffcd69e_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-19_a9fe5d552f24ec985517ad471ffcd69e_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-19_a9fe5d552f24ec985517ad471ffcd69e_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD58ded7ba9ba8075c7177fbbe856bca4f2
SHA11805fbc6d56120235230e8e0d8d9feb209b0e8a2
SHA2569926a0306bf068acc1fb88dc8198725421b5257d999da6bd10df49e759ce1294
SHA512b801e081f83041cd149f8a5b2d7d333a55d96df6fc0ce6848837ede5fd3d9b7a4e60eea6b9be76df03202c907ad6b154766d907775a46ab3b323bdd84e075085