Analysis

  • max time kernel
    92s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 05:22

General

  • Target

    2024-11-20_0c56b6140c8bb76e3b2c457433be79ec_cryptolocker.exe

  • Size

    69KB

  • MD5

    0c56b6140c8bb76e3b2c457433be79ec

  • SHA1

    d3ba4f82befa7021e451827e93c06fb35a0488b6

  • SHA256

    71b8cda5c1532166a2847b632ddc193dbac92b58cd28961380524473d66dc092

  • SHA512

    1c8e636f3405a6771a73986212ba3c5add5cf69dfd21ac2bf9b0ed4869e2423a6e3ccd1f94b4aabfd52487e70c0a6cc5a7080ecd584a74b365a956ef4b60d04b

  • SSDEEP

    1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszudnYTjipvF293vaRLE2:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7e

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-11-20_0c56b6140c8bb76e3b2c457433be79ec_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-11-20_0c56b6140c8bb76e3b2c457433be79ec_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:464
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    69KB

    MD5

    5ff45310eba8629ae2785defe02525b4

    SHA1

    1c808e995be4ba17290cc305cbf6e612815a1c4c

    SHA256

    2aed72e3619d81aea5c84955b5405f1bea817fcb78af34a8863c7d4d0eb9be1c

    SHA512

    c87d736ab32f7d09ff726123cff9c61a035533dbb081e26919a4e1835caf19af61a22a05ba021027aac3977c1e60d631b8c2f63328e67550f7658f19ccb1600c

  • memory/464-0-0x0000000000570000-0x0000000000576000-memory.dmp

    Filesize

    24KB

  • memory/464-1-0x0000000000570000-0x0000000000576000-memory.dmp

    Filesize

    24KB

  • memory/464-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/4680-19-0x0000000000590000-0x0000000000596000-memory.dmp

    Filesize

    24KB