Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 00:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-30_084438787624081a5b803aea8fa2b82e_cryptolocker.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-30_084438787624081a5b803aea8fa2b82e_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-30_084438787624081a5b803aea8fa2b82e_cryptolocker.exe
-
Size
29KB
-
MD5
084438787624081a5b803aea8fa2b82e
-
SHA1
60c37eb4165b3cbd330b9fd6ffe0ef2a78a60612
-
SHA256
559e120a52f1b9caf98919957f6e485d2a0f26b69aa18f8e9460daf9493e3643
-
SHA512
a958706919208ca8ca13784d5818dfe51a3cc01ab426867174767b243dd0938b4bd8c90c50694996814adc47fd115c912c02b8ec3081bc06d91ea49f015c4d41
-
SSDEEP
768:Kf1K2exg2kBwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZsBGGpNEmK/M:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2940 hurok.exe -
Loads dropped DLL 1 IoCs
pid Process 2096 2024-09-30_084438787624081a5b803aea8fa2b82e_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-30_084438787624081a5b803aea8fa2b82e_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hurok.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2096 2024-09-30_084438787624081a5b803aea8fa2b82e_cryptolocker.exe 2940 hurok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2940 2096 2024-09-30_084438787624081a5b803aea8fa2b82e_cryptolocker.exe 30 PID 2096 wrote to memory of 2940 2096 2024-09-30_084438787624081a5b803aea8fa2b82e_cryptolocker.exe 30 PID 2096 wrote to memory of 2940 2096 2024-09-30_084438787624081a5b803aea8fa2b82e_cryptolocker.exe 30 PID 2096 wrote to memory of 2940 2096 2024-09-30_084438787624081a5b803aea8fa2b82e_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-30_084438787624081a5b803aea8fa2b82e_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-30_084438787624081a5b803aea8fa2b82e_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5c55960405c0e760df165cfdbbb7b9270
SHA19f47c9b0e5712fdac02969094b6ee966fc4bdb30
SHA2560439d69d7ce20e81032d381ccc877632d9f2246113a2624fd1a4b9710cc77261
SHA5122ad9ae1ed70f71eb4df8c8149deea4b74b9999f83bcdeaf3df3c1fed892a5d0316d6f30f018aa23dd52dcae1de36f3461b575f07c430d52485e2e226fd0eec22