Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10/10/2024, 03:00
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-10_82208b5e0d7d20d85fc66b57fa22e3b9_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-10_82208b5e0d7d20d85fc66b57fa22e3b9_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-10_82208b5e0d7d20d85fc66b57fa22e3b9_cryptolocker.exe
-
Size
41KB
-
MD5
82208b5e0d7d20d85fc66b57fa22e3b9
-
SHA1
0eb7beb9e28d93787e37f21644dd755c38d25f2c
-
SHA256
56df82623e8fdfdfb9bff248234265dc6bda94354d31e1183bda383a6770ef07
-
SHA512
12aa5bf1e73aa5caaacc400092dd5c0d6669da66d590a00d4c3c42e938473e677c17c374db0a47c06aff549b462ce11d1b1b838b5fab126e7f15a96d43ea175e
-
SSDEEP
768:Kf1K2exg2kBwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZsBGGpebVIYLHA3Kxy:o1KhxqwtdgI2MyzNORQtOflIwoHNV2X/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1228 hurok.exe -
Loads dropped DLL 1 IoCs
pid Process 2816 2024-10-10_82208b5e0d7d20d85fc66b57fa22e3b9_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-10_82208b5e0d7d20d85fc66b57fa22e3b9_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hurok.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2816 2024-10-10_82208b5e0d7d20d85fc66b57fa22e3b9_cryptolocker.exe 1228 hurok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2816 wrote to memory of 1228 2816 2024-10-10_82208b5e0d7d20d85fc66b57fa22e3b9_cryptolocker.exe 31 PID 2816 wrote to memory of 1228 2816 2024-10-10_82208b5e0d7d20d85fc66b57fa22e3b9_cryptolocker.exe 31 PID 2816 wrote to memory of 1228 2816 2024-10-10_82208b5e0d7d20d85fc66b57fa22e3b9_cryptolocker.exe 31 PID 2816 wrote to memory of 1228 2816 2024-10-10_82208b5e0d7d20d85fc66b57fa22e3b9_cryptolocker.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-10_82208b5e0d7d20d85fc66b57fa22e3b9_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-10_82208b5e0d7d20d85fc66b57fa22e3b9_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:1228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD536a7bab68c7e98523d51923b84b3f3b7
SHA19c137a3604b8cc7e67b60f59649bea7150622b1c
SHA25692c0a4e4c74e79506e308a25450bd5402fa47288947a6c5b4ae0d2c336f04c1c
SHA512038f8d1c43b4f4ccbb4e84e695a33e4cf2ce7c188474ca30e376cd5c55d8587d2db774a1acbfbd43f59c7021e5150aa31d3e1ebfe1e232b5ba9347b1f27f4a4e