Analysis

  • max time kernel
    138s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-10-2024 08:16

General

  • Target

    2024-10-31_f4e891c48a415f94ff23b27a9d0fe73c_cryptolocker.exe

  • Size

    69KB

  • MD5

    f4e891c48a415f94ff23b27a9d0fe73c

  • SHA1

    febd48803dc743f84a96b08e614e155b20df520d

  • SHA256

    ba36a022eb4976d8cf84bcfb7ae1e786d6e41665d3b4a66f4a8fc108bb417a98

  • SHA512

    8de3afb15cd3fa611dfbff70890225a98a96cb3d9d8e900a256caa301977667f43f21d3815b7ca2102396876b0d053453684a4e8fefbbb32c75a616e87677e44

  • SSDEEP

    1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszudnYTjipvF293vaRLEa:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7S

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-31_f4e891c48a415f94ff23b27a9d0fe73c_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-31_f4e891c48a415f94ff23b27a9d0fe73c_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4428
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    69KB

    MD5

    c24ca4e112f1c6f6c914aa729636cd80

    SHA1

    8168fcd721142d30487cb0afd9f1312c81031f90

    SHA256

    d87f5d1eba2bab7f90032c1c78b04913f90d73f6b465e6b0ccb31c70c6a463a4

    SHA512

    cd0d7ee3f8e776d1addbf70ced7f39fd5e51b84515ac7495b606b6664caa5d086e44d01c21c83470befd9d44f45cb2fc9fa3620dbf8ec5beaf2a4e706d624c9a

  • memory/1840-19-0x0000000001FC0000-0x0000000001FC6000-memory.dmp

    Filesize

    24KB

  • memory/4428-0-0x0000000002190000-0x0000000002196000-memory.dmp

    Filesize

    24KB

  • memory/4428-1-0x0000000002190000-0x0000000002196000-memory.dmp

    Filesize

    24KB

  • memory/4428-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB