Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 02:51
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-02_adbe87852fb969848c8af222e9161a8a_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-02_adbe87852fb969848c8af222e9161a8a_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-02_adbe87852fb969848c8af222e9161a8a_cryptolocker.exe
-
Size
70KB
-
MD5
adbe87852fb969848c8af222e9161a8a
-
SHA1
4f883012fb7e9d98a79566321024eacf5ac4d3e1
-
SHA256
9c9716e18a050fa69a28d1656f2ef2b02bc97444699022ae453e5e42a40dfd15
-
SHA512
08a515efc9eded1a2339a97df6f081e19c236feb341b99f68c95a96ee004790f130173580a71079ab49ee0c7fba58e1e81e38e99d2d58c68fc95fcc454f3060e
-
SSDEEP
1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszudnYTjipvF293vaRLEx:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7p
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2532 hurok.exe -
Loads dropped DLL 1 IoCs
pid Process 2224 2024-10-02_adbe87852fb969848c8af222e9161a8a_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-02_adbe87852fb969848c8af222e9161a8a_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hurok.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2224 2024-10-02_adbe87852fb969848c8af222e9161a8a_cryptolocker.exe 2532 hurok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2532 2224 2024-10-02_adbe87852fb969848c8af222e9161a8a_cryptolocker.exe 30 PID 2224 wrote to memory of 2532 2224 2024-10-02_adbe87852fb969848c8af222e9161a8a_cryptolocker.exe 30 PID 2224 wrote to memory of 2532 2224 2024-10-02_adbe87852fb969848c8af222e9161a8a_cryptolocker.exe 30 PID 2224 wrote to memory of 2532 2224 2024-10-02_adbe87852fb969848c8af222e9161a8a_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-02_adbe87852fb969848c8af222e9161a8a_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-02_adbe87852fb969848c8af222e9161a8a_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD5d8fa4927c113e5217aa0de03940613fb
SHA1558bbd9dd50853d476180e2a91a160766cd867aa
SHA256f666507ca68a38531658e261c60592b9e8ac596ba956b52f7f200eec66886690
SHA51268554d59cc57275ff1aeebef69c98ab642d5c81e78e694f4e01bea48ec3f7be47815fb3f03fc549714e5c059d2d46ddb5872f4e845eac82b55b58e2e41bc58b1