Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 07:27

General

  • Target

    2024-11-21_327d809c35ae24e6e1113f0470e2a036_cryptolocker.exe

  • Size

    50KB

  • MD5

    327d809c35ae24e6e1113f0470e2a036

  • SHA1

    6c444d7c04df717ecaaa5c625eb8f9bcf728c7e8

  • SHA256

    ab4b244b4049484e4bd6b18de5df7eefa270d2a7c5e0e2f3e23c0714179d0b90

  • SHA512

    83e1ad2e358ae40d424de4a9d21e1f8108f3e4a17dd8edecdf4b9117e1417d1c7a9c67c3b52eec965b54ee3cc7543a9903d86ef70ee296ddab5b7f9f311f6957

  • SSDEEP

    1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszsbKY1x5hjatshMY:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7u

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-11-21_327d809c35ae24e6e1113f0470e2a036_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-11-21_327d809c35ae24e6e1113f0470e2a036_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of UnmapMainImage
      PID:2920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    50KB

    MD5

    173b5fe08f55e8164b42918f746771d8

    SHA1

    da3b2bf6a7d6256f096a7f9b5759da190e30385c

    SHA256

    d57a02a489952e4eafe7232921d9cb88e5b3bf9e0991b62afcf94262992f2cbe

    SHA512

    4a80635c6777cb1e7b4401491ccd4279b622ed1881f580677a0cf944915ffb3487d48c4539dfa2817d1d10a1631ff99cc6a4bbd1baff79f60a714046c4206e53

  • memory/2112-8-0x0000000000230000-0x0000000000236000-memory.dmp

    Filesize

    24KB

  • memory/2112-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2112-0-0x0000000000230000-0x0000000000236000-memory.dmp

    Filesize

    24KB