Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 03:22
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-20_091f4358d2bf024d6e15aa4e864ba010_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-20_091f4358d2bf024d6e15aa4e864ba010_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-20_091f4358d2bf024d6e15aa4e864ba010_cryptolocker.exe
-
Size
55KB
-
MD5
091f4358d2bf024d6e15aa4e864ba010
-
SHA1
67a39a71dc5390f3648fe73868fe2e7d2b31c0ca
-
SHA256
d7e7874de8d0d639577333fb5e22a79633b637f459a29e2b3d8214167e90a5b0
-
SHA512
7a15e2149f54c89a2e1ac20f82c4be4e89725eaa1c1ffb82374b569ea0360d9d3a7c706ab0a1eb6d4997b5be75f61739a60a29b703c23afafc0fceca35387c23
-
SSDEEP
1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1xzpAIX6Ex6:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7B
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2208 hurok.exe -
Loads dropped DLL 1 IoCs
pid Process 1708 2024-11-20_091f4358d2bf024d6e15aa4e864ba010_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-20_091f4358d2bf024d6e15aa4e864ba010_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hurok.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1708 2024-11-20_091f4358d2bf024d6e15aa4e864ba010_cryptolocker.exe 2208 hurok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2208 1708 2024-11-20_091f4358d2bf024d6e15aa4e864ba010_cryptolocker.exe 31 PID 1708 wrote to memory of 2208 1708 2024-11-20_091f4358d2bf024d6e15aa4e864ba010_cryptolocker.exe 31 PID 1708 wrote to memory of 2208 1708 2024-11-20_091f4358d2bf024d6e15aa4e864ba010_cryptolocker.exe 31 PID 1708 wrote to memory of 2208 1708 2024-11-20_091f4358d2bf024d6e15aa4e864ba010_cryptolocker.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_091f4358d2bf024d6e15aa4e864ba010_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-20_091f4358d2bf024d6e15aa4e864ba010_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD507bfc8342ee07d03a6b678d42773dd81
SHA14484c98b3219f5906111fae9c64e5fbac8aa8000
SHA256d8dc52ee1adfbf2cafe6b95e0e405160eac5b14ae05c6c49de736400d42ea250
SHA512337198a91b951764453d923ecb3ace1c9012aba9485c6790b8fc7ace26414b0fc40db4c2047646aa37c05a61c49b899b2850ce3c59432ca24432ef905cb23aa8