Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-11-2024 06:19

General

  • Target

    2024-11-02_b9707d541287b1c767e0fe290987e2ec_cryptolocker.exe

  • Size

    56KB

  • MD5

    b9707d541287b1c767e0fe290987e2ec

  • SHA1

    3bad6acf5d57c40f965dab97fcba285f299ee333

  • SHA256

    8d2a5e851d21fdf6525889c83bc871ca7762c7cd06484679453b871ff99616b5

  • SHA512

    a96cce459be500debeec588af82082c013c383ee2a4d51003a470c910211e3488be87f9f828229381333251e00d08016f6e0b39075667bf9230c673f6fe480fe

  • SSDEEP

    1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1xzp0oj67Jn:aq7tdgI2MyzNORQtOflIwoHNV2XBFV71

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-11-02_b9707d541287b1c767e0fe290987e2ec_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-11-02_b9707d541287b1c767e0fe290987e2ec_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2984
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of UnmapMainImage
      PID:2804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    56KB

    MD5

    f5caf92dcab7abf4f29e347b3edab5ff

    SHA1

    69a30db97612e4b51a54953cfcddc0947ea53d65

    SHA256

    a41e4962fcd7d2407cdd0c350d5048718e9f3dab7f8ed4134b0d2cf0ffecb09d

    SHA512

    6a0cfa7e7533ca9beebb2d3e952bc207648672e0f936c969ed017155b430d56f668ee4b46886ef8ca0064b13b681b5d4a311080d36123cdc8077bfdc816e5c45

  • memory/2804-23-0x0000000000310000-0x0000000000316000-memory.dmp

    Filesize

    24KB

  • memory/2984-8-0x00000000003C0000-0x00000000003C6000-memory.dmp

    Filesize

    24KB

  • memory/2984-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2984-0-0x00000000003C0000-0x00000000003C6000-memory.dmp

    Filesize

    24KB