Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2023 17:17
Static task
static1
Behavioral task
behavioral1
Sample
33afd1b7b9cfc7ae8a5ab0987fbb9c46_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
33afd1b7b9cfc7ae8a5ab0987fbb9c46_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
33afd1b7b9cfc7ae8a5ab0987fbb9c46_cryptolocker_JC.exe
-
Size
54KB
-
MD5
33afd1b7b9cfc7ae8a5ab0987fbb9c46
-
SHA1
73d1e17f436648dffba1cdd4bda3925cdb7b2452
-
SHA256
40b2f62692239b7c81aadbb98f7ebe40c8e077d98fdaabd40a11eeeb562fe6e7
-
SHA512
f797258c46a9bc980d0c39047155d93ff78b9441342670f5bd06a0fcc6f32e150fff6e8fbf96deb5634e078ce7b9b8e0d1d21f3afc3f81b224af8b2cdd93c45a
-
SSDEEP
1536:V6QFElP6n+gMQMOtEvwDpjyaLccCKdulcrm:V6a+pOtEvwDpjv9a
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5020 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 536 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1736 wrote to memory of 5020 1736 33afd1b7b9cfc7ae8a5ab0987fbb9c46_cryptolocker_JC.exe 86 PID 1736 wrote to memory of 5020 1736 33afd1b7b9cfc7ae8a5ab0987fbb9c46_cryptolocker_JC.exe 86 PID 1736 wrote to memory of 5020 1736 33afd1b7b9cfc7ae8a5ab0987fbb9c46_cryptolocker_JC.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\33afd1b7b9cfc7ae8a5ab0987fbb9c46_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\33afd1b7b9cfc7ae8a5ab0987fbb9c46_cryptolocker_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:5020
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4140
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD595642003ab4c7cf1d080e2e389ffce66
SHA1b340c6c5ce2b03adc3b41809c38535e740faa002
SHA256a3bcd5acb479859f1889b61609fd4c0b34019e956a7414a32e6615a9fd6f9f6e
SHA512f7f2862ab19616c391022f53623fd343c8bd27dcd1aa3d79d4c159fbe6017bf41ca9470136c062550a2d81c568256a98006bbf4f2af81e725a21ac0b12df93e2
-
Filesize
54KB
MD5e39e2839244e73a4e0851a2dfe2f94be
SHA1ab66111e1a13fa6be520d4517b0fb58685153e90
SHA25643478eb0e0d1ec72acea8bc74583f06c8325aeab8664f3d1d8c2bea26dfe22fd
SHA51228f55c5c71bad9dbb369d20bcbe8848d8ac874bafd9f48ccc5d44bdb8432974a61a560c03f448088013381acfd8e02dbb8600111cb775a3308ef9d8cb3dd1584
-
Filesize
54KB
MD5e39e2839244e73a4e0851a2dfe2f94be
SHA1ab66111e1a13fa6be520d4517b0fb58685153e90
SHA25643478eb0e0d1ec72acea8bc74583f06c8325aeab8664f3d1d8c2bea26dfe22fd
SHA51228f55c5c71bad9dbb369d20bcbe8848d8ac874bafd9f48ccc5d44bdb8432974a61a560c03f448088013381acfd8e02dbb8600111cb775a3308ef9d8cb3dd1584
-
Filesize
54KB
MD5e39e2839244e73a4e0851a2dfe2f94be
SHA1ab66111e1a13fa6be520d4517b0fb58685153e90
SHA25643478eb0e0d1ec72acea8bc74583f06c8325aeab8664f3d1d8c2bea26dfe22fd
SHA51228f55c5c71bad9dbb369d20bcbe8848d8ac874bafd9f48ccc5d44bdb8432974a61a560c03f448088013381acfd8e02dbb8600111cb775a3308ef9d8cb3dd1584