Analysis

  • max time kernel
    95s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2024 01:24

General

  • Target

    2024-10-02_29bd797fbabc3955a90a04e931659032_cryptolocker.exe

  • Size

    29KB

  • MD5

    29bd797fbabc3955a90a04e931659032

  • SHA1

    044c5626e2a98617e187255b56b91ed28c5848ad

  • SHA256

    59122a234a148c9c62f4eaadc6262eaccb91bb1aa27ab5f05ae6ab0bbe9507f8

  • SHA512

    1c740732d9a9b2bf091699fd8055386f5478e3b1442187726fa825ea7ffc0d2e5cb711ff691c4c10cfb8a442b1fed0cd7d0443be3cece792ccda0b2bcfeb4502

  • SSDEEP

    768:Kf1K2exg2kBwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZsBGGuOtCF7WDQC:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XJ

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-02_29bd797fbabc3955a90a04e931659032_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-02_29bd797fbabc3955a90a04e931659032_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3620
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2444

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    30KB

    MD5

    7440b2bf113e4d7c6635b2e2a2aa80ba

    SHA1

    9cc69170ac29997f1d03383b7d78a150b4097309

    SHA256

    8a37cee54f0cd22b68d34070b2af963f26a3e2540e8a520a53601048292e0560

    SHA512

    d3a32d9b5426cd81e4d12275c4b12508e3200ff76d542c467854f9eff7d07a4d39e50280a2c48ccb56041188e62b9a638a29d3d55719883546bac9e645312fab

  • memory/2444-19-0x0000000001F40000-0x0000000001F46000-memory.dmp

    Filesize

    24KB

  • memory/3620-1-0x0000000000660000-0x0000000000666000-memory.dmp

    Filesize

    24KB

  • memory/3620-0-0x0000000000660000-0x0000000000666000-memory.dmp

    Filesize

    24KB

  • memory/3620-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB