Analysis
-
max time kernel
131s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
01-08-2023 17:48
Static task
static1
Behavioral task
behavioral1
Sample
357eeb9968b53eb7221bccc8d877d232_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
357eeb9968b53eb7221bccc8d877d232_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
357eeb9968b53eb7221bccc8d877d232_cryptolocker_JC.exe
-
Size
80KB
-
MD5
357eeb9968b53eb7221bccc8d877d232
-
SHA1
e9b34a0f83f0cdfe742a1de7359a9858fd25d7ae
-
SHA256
d2a14dbfd488e10ea32a92ab689dbb1b7ef461e7625dd65ed3b7c73326b1189c
-
SHA512
a93aaa560c6303b7ece585e58e20267a8a56bb0805d43a246700221cc8cc81b896ba24914f7573597d3893c5f68ecc5d8aafcf3e74ae807e0d12ffaa1678242d
-
SSDEEP
768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjIm8z2iaSIO/RvDQeduJHqqnzvNG1I:ZzFbxmLPWQMOtEvwDpj386Sj/RsxQz8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2944 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2592 357eeb9968b53eb7221bccc8d877d232_cryptolocker_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2592 wrote to memory of 2944 2592 357eeb9968b53eb7221bccc8d877d232_cryptolocker_JC.exe 28 PID 2592 wrote to memory of 2944 2592 357eeb9968b53eb7221bccc8d877d232_cryptolocker_JC.exe 28 PID 2592 wrote to memory of 2944 2592 357eeb9968b53eb7221bccc8d877d232_cryptolocker_JC.exe 28 PID 2592 wrote to memory of 2944 2592 357eeb9968b53eb7221bccc8d877d232_cryptolocker_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\357eeb9968b53eb7221bccc8d877d232_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\357eeb9968b53eb7221bccc8d877d232_cryptolocker_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD548663d08ffd7546b3c86bc2dc63e0edb
SHA15c1b77745ec8395ece3b89e547ce1ba5566bd6cb
SHA256ea58b55053d90e504bbb7aea4a62b205deee3917a97d3a64e26b4b65a1ab0c99
SHA51205dd9336cc01debac3de62c62068908e3ad6e23a738d6c306eeff28aa9d4b88f045e8f76780a0dda9145ad2e5cf535b26427cbcbd1690222a21d7e6df62159b3
-
Filesize
80KB
MD548663d08ffd7546b3c86bc2dc63e0edb
SHA15c1b77745ec8395ece3b89e547ce1ba5566bd6cb
SHA256ea58b55053d90e504bbb7aea4a62b205deee3917a97d3a64e26b4b65a1ab0c99
SHA51205dd9336cc01debac3de62c62068908e3ad6e23a738d6c306eeff28aa9d4b88f045e8f76780a0dda9145ad2e5cf535b26427cbcbd1690222a21d7e6df62159b3
-
Filesize
80KB
MD548663d08ffd7546b3c86bc2dc63e0edb
SHA15c1b77745ec8395ece3b89e547ce1ba5566bd6cb
SHA256ea58b55053d90e504bbb7aea4a62b205deee3917a97d3a64e26b4b65a1ab0c99
SHA51205dd9336cc01debac3de62c62068908e3ad6e23a738d6c306eeff28aa9d4b88f045e8f76780a0dda9145ad2e5cf535b26427cbcbd1690222a21d7e6df62159b3