Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    31-10-2024 08:16

General

  • Target

    2024-10-31_f4e891c48a415f94ff23b27a9d0fe73c_cryptolocker.exe

  • Size

    69KB

  • MD5

    f4e891c48a415f94ff23b27a9d0fe73c

  • SHA1

    febd48803dc743f84a96b08e614e155b20df520d

  • SHA256

    ba36a022eb4976d8cf84bcfb7ae1e786d6e41665d3b4a66f4a8fc108bb417a98

  • SHA512

    8de3afb15cd3fa611dfbff70890225a98a96cb3d9d8e900a256caa301977667f43f21d3815b7ca2102396876b0d053453684a4e8fefbbb32c75a616e87677e44

  • SSDEEP

    1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszudnYTjipvF293vaRLEa:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7S

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-31_f4e891c48a415f94ff23b27a9d0fe73c_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-31_f4e891c48a415f94ff23b27a9d0fe73c_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3004
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of UnmapMainImage
      PID:2524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    69KB

    MD5

    c24ca4e112f1c6f6c914aa729636cd80

    SHA1

    8168fcd721142d30487cb0afd9f1312c81031f90

    SHA256

    d87f5d1eba2bab7f90032c1c78b04913f90d73f6b465e6b0ccb31c70c6a463a4

    SHA512

    cd0d7ee3f8e776d1addbf70ced7f39fd5e51b84515ac7495b606b6664caa5d086e44d01c21c83470befd9d44f45cb2fc9fa3620dbf8ec5beaf2a4e706d624c9a

  • memory/2524-23-0x00000000002B0000-0x00000000002B6000-memory.dmp

    Filesize

    24KB

  • memory/3004-1-0x0000000000230000-0x0000000000236000-memory.dmp

    Filesize

    24KB

  • memory/3004-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/3004-0-0x0000000000230000-0x0000000000236000-memory.dmp

    Filesize

    24KB