Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 05:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-20_d71869270b9a966c67faa68a7e5558e3_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-20_d71869270b9a966c67faa68a7e5558e3_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-20_d71869270b9a966c67faa68a7e5558e3_cryptolocker.exe
-
Size
49KB
-
MD5
d71869270b9a966c67faa68a7e5558e3
-
SHA1
85781b2c04515caa91fc8978066f62686f432699
-
SHA256
d08446443e2370c4896d1ea69af114ceccdce9cefbf063048f7788d3392bf6e3
-
SHA512
2376fe9ef10176ece3ba8b92bfe2b2477cc39bee1dd45a1fbd06931e9386eca1623ba770994fe1799e9c1ce72a30b7e73962fe0963853f5f10be2571b347b7db
-
SSDEEP
1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1x5hjatF:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7h
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2692 hurok.exe -
Loads dropped DLL 1 IoCs
pid Process 2128 2024-11-20_d71869270b9a966c67faa68a7e5558e3_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-20_d71869270b9a966c67faa68a7e5558e3_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hurok.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2128 2024-11-20_d71869270b9a966c67faa68a7e5558e3_cryptolocker.exe 2692 hurok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2692 2128 2024-11-20_d71869270b9a966c67faa68a7e5558e3_cryptolocker.exe 31 PID 2128 wrote to memory of 2692 2128 2024-11-20_d71869270b9a966c67faa68a7e5558e3_cryptolocker.exe 31 PID 2128 wrote to memory of 2692 2128 2024-11-20_d71869270b9a966c67faa68a7e5558e3_cryptolocker.exe 31 PID 2128 wrote to memory of 2692 2128 2024-11-20_d71869270b9a966c67faa68a7e5558e3_cryptolocker.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_d71869270b9a966c67faa68a7e5558e3_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-20_d71869270b9a966c67faa68a7e5558e3_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD5f4bd5b92f2b4bfd407c0140684314733
SHA14e1f87b6d9729f29655cab199a106c706179ce0d
SHA256fd17a5c3152d28843f7a488a258a0687b1ab9b8d8d9ac90668ca0124da7d031e
SHA512ee1815e2e724aeea1cb079c1d94dc21534ec2e80cfb5be5d6c15108287a713182855947cd3dbfd35c0c8407d44e60cc5e622347c928814ea922a49e93bc49ebb