Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    04-10-2024 03:25

General

  • Target

    2024-10-04_1e7f6f9a69efd0aa300d9373f538b617_cryptolocker.exe

  • Size

    32KB

  • MD5

    1e7f6f9a69efd0aa300d9373f538b617

  • SHA1

    a960e26484566df6820313423f4835cb54a3d181

  • SHA256

    cdb2c0847ee666664ae6311ac10a0dd0124c5920768f75a6269f49be3d82ba29

  • SHA512

    e5e29a684025ab0be7a2331b4debf368259269248166c6cd68a996626592d369da8853ff08aeef248f152c4b2ee2f573dfe784b1614d443f500c8f5b26af43ad

  • SSDEEP

    768:Kf1K2exg2kBwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZsBGGbNAKSjNfOu:o1KhxqwtdgI2MyzNORQtOflIwoHNV2X8

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-04_1e7f6f9a69efd0aa300d9373f538b617_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-04_1e7f6f9a69efd0aa300d9373f538b617_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of UnmapMainImage
      PID:2868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    32KB

    MD5

    cc83a0c7b3989fddf4ca2113b0d9eaa7

    SHA1

    a6dba65b654297116b12ee5945a9d80c107d73b0

    SHA256

    76ad02e952a8fc5cab9f5af25df104a9fb9da1c3b795ff87b4afc13ac8e3652b

    SHA512

    934022e47dd9f4dc08c48585fe9740f3e809da9e52a6364736d0e696f1961dbca9cce0756a4499b9f075bcf7738d3d71fe24c4762c941b20cf8a19bd2af3196b

  • memory/1620-0-0x0000000000270000-0x0000000000276000-memory.dmp

    Filesize

    24KB

  • memory/1620-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/1620-8-0x0000000000270000-0x0000000000276000-memory.dmp

    Filesize

    24KB

  • memory/2868-16-0x00000000002B0000-0x00000000002B6000-memory.dmp

    Filesize

    24KB