Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2023 14:35
Behavioral task
behavioral1
Sample
2782a9c58b9e6a6154fd68d2749b08dd_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
2782a9c58b9e6a6154fd68d2749b08dd_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
2782a9c58b9e6a6154fd68d2749b08dd_cryptolocker_JC.exe
-
Size
39KB
-
MD5
2782a9c58b9e6a6154fd68d2749b08dd
-
SHA1
c037f663e67c8b7afe68f1db4fed47173154ae42
-
SHA256
a54c7881fb9dc538f52eed7f7ba52ca30261ff7b78774372c89d36eb2d2a3032
-
SHA512
f243a844c51dfb02782377cc9bf654994700851b6e0a800804038bb587aa21c664ca5a7728f034c47481df284f00913d57c6a8eeccc776f9c371face3c4f40c6
-
SSDEEP
768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5aFr7YOzzOX:qUmnpomddpMOtEvwDpjjaYaFAH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4908 asih.exe -
resource yara_rule behavioral2/memory/2564-133-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/files/0x0006000000023206-146.dat upx behavioral2/files/0x0006000000023206-148.dat upx behavioral2/memory/2564-150-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/files/0x0006000000023206-149.dat upx behavioral2/memory/4908-159-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2564 wrote to memory of 4908 2564 2782a9c58b9e6a6154fd68d2749b08dd_cryptolocker_JC.exe 87 PID 2564 wrote to memory of 4908 2564 2782a9c58b9e6a6154fd68d2749b08dd_cryptolocker_JC.exe 87 PID 2564 wrote to memory of 4908 2564 2782a9c58b9e6a6154fd68d2749b08dd_cryptolocker_JC.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2782a9c58b9e6a6154fd68d2749b08dd_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\2782a9c58b9e6a6154fd68d2749b08dd_cryptolocker_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:4908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD581c68017f09e9fe1cf2d6fb17f3bcf93
SHA18732ac5bf5746a5c9e89994e36dc9c3a750306d7
SHA256c0a9b167da7b6aeb53b3ab5cee5a143c0637f7842e0f165e2733bad8be27cb95
SHA5122a840656a16bcd13692af13ca38f3f2286a2c978a1005dffa4c057ef49d2d66c709aed233052175d8f9ee5295df2d2cf876b72607f3b25ef82b2658647c67719
-
Filesize
39KB
MD581c68017f09e9fe1cf2d6fb17f3bcf93
SHA18732ac5bf5746a5c9e89994e36dc9c3a750306d7
SHA256c0a9b167da7b6aeb53b3ab5cee5a143c0637f7842e0f165e2733bad8be27cb95
SHA5122a840656a16bcd13692af13ca38f3f2286a2c978a1005dffa4c057ef49d2d66c709aed233052175d8f9ee5295df2d2cf876b72607f3b25ef82b2658647c67719
-
Filesize
39KB
MD581c68017f09e9fe1cf2d6fb17f3bcf93
SHA18732ac5bf5746a5c9e89994e36dc9c3a750306d7
SHA256c0a9b167da7b6aeb53b3ab5cee5a143c0637f7842e0f165e2733bad8be27cb95
SHA5122a840656a16bcd13692af13ca38f3f2286a2c978a1005dffa4c057ef49d2d66c709aed233052175d8f9ee5295df2d2cf876b72607f3b25ef82b2658647c67719