Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
01/08/2023, 15:58
Behavioral task
behavioral1
Sample
2d5b29953c879f9c280b8a4270f36eef_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
2d5b29953c879f9c280b8a4270f36eef_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
2d5b29953c879f9c280b8a4270f36eef_cryptolocker_JC.exe
-
Size
73KB
-
MD5
2d5b29953c879f9c280b8a4270f36eef
-
SHA1
3deb5e94500d1a4d9a688d5d92aa2f54edb57504
-
SHA256
2fa2257a2ad5c39a68119d111017cf9972ffca7f38823b67190aca9f374180d4
-
SHA512
cd989c72a2fb08981a4b1b74de965f3913e5292b2370fcd3e8d8cd52289a9b805c925dec621ef8f3c4babb27286ce944b458ca82560131582481f63d6d346820
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalDSJq:1nK6a+qdOOtEvwDpjO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1824 asih.exe -
resource yara_rule behavioral2/memory/5068-133-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral2/files/0x00070000000231e9-146.dat upx behavioral2/files/0x00070000000231e9-148.dat upx behavioral2/files/0x00070000000231e9-149.dat upx behavioral2/memory/5068-151-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral2/memory/1824-159-0x0000000000500000-0x000000000050F311-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5068 wrote to memory of 1824 5068 2d5b29953c879f9c280b8a4270f36eef_cryptolocker_JC.exe 86 PID 5068 wrote to memory of 1824 5068 2d5b29953c879f9c280b8a4270f36eef_cryptolocker_JC.exe 86 PID 5068 wrote to memory of 1824 5068 2d5b29953c879f9c280b8a4270f36eef_cryptolocker_JC.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d5b29953c879f9c280b8a4270f36eef_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\2d5b29953c879f9c280b8a4270f36eef_cryptolocker_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:1824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5989f0f2fc776534cc227ce79b5ff844a
SHA14f2660bb5d09d75c7fbb1760cf4aac37533c2fc4
SHA25658575f67a7b0a8763f8c5ba55f29f53477da8569b47ef0d9bcfebe561a7ade59
SHA51238618673d2dd250dcd9abd4d1cd753b3f467d8038793a833511ca2e244162064b8ede8739c7254e95ce6ce3128a7338564031614182b659281e04442ebf9d391
-
Filesize
73KB
MD5989f0f2fc776534cc227ce79b5ff844a
SHA14f2660bb5d09d75c7fbb1760cf4aac37533c2fc4
SHA25658575f67a7b0a8763f8c5ba55f29f53477da8569b47ef0d9bcfebe561a7ade59
SHA51238618673d2dd250dcd9abd4d1cd753b3f467d8038793a833511ca2e244162064b8ede8739c7254e95ce6ce3128a7338564031614182b659281e04442ebf9d391
-
Filesize
73KB
MD5989f0f2fc776534cc227ce79b5ff844a
SHA14f2660bb5d09d75c7fbb1760cf4aac37533c2fc4
SHA25658575f67a7b0a8763f8c5ba55f29f53477da8569b47ef0d9bcfebe561a7ade59
SHA51238618673d2dd250dcd9abd4d1cd753b3f467d8038793a833511ca2e244162064b8ede8739c7254e95ce6ce3128a7338564031614182b659281e04442ebf9d391