Analysis
-
max time kernel
133s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
02/08/2023, 19:31
Static task
static1
Behavioral task
behavioral1
Sample
460d69139511072104a574003de20357_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
460d69139511072104a574003de20357_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
460d69139511072104a574003de20357_cryptolocker_JC.exe
-
Size
30KB
-
MD5
460d69139511072104a574003de20357
-
SHA1
81cf7182913bb045d283f1fb268ced0e026094c9
-
SHA256
dd92137e557558d4b865881ff9ee6517ad049cc421ca06c40da972c3eee8cba2
-
SHA512
43df1045d20de09da53b26780de043ed5a79bbf68710017a6ec6403430fcb3388a7898c9f93539eef36a2b89083f3ea12a38368a4548582663887a6b680d3c0e
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBjML1:X6QFElP6n+gJQMOtEvwDpjBe1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2816 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2184 460d69139511072104a574003de20357_cryptolocker_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2816 2184 460d69139511072104a574003de20357_cryptolocker_JC.exe 28 PID 2184 wrote to memory of 2816 2184 460d69139511072104a574003de20357_cryptolocker_JC.exe 28 PID 2184 wrote to memory of 2816 2184 460d69139511072104a574003de20357_cryptolocker_JC.exe 28 PID 2184 wrote to memory of 2816 2184 460d69139511072104a574003de20357_cryptolocker_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\460d69139511072104a574003de20357_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\460d69139511072104a574003de20357_cryptolocker_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5f7b4b3a3249a2767d95f7d39863298c9
SHA188bf2c7aee33d2bcdf3cc3f45d26ef514eb2ab0f
SHA256c8afdb610abab8aba549896e57a7c0b5f78bef8eaf9f9311c1d78c46dd40fc38
SHA51289024a3f1492113ecfd7fb93adeefffee028b0f4c5f8de02801ae73e13e81c6933eae360c21e6a2ea647770178f3ac5d0ae6caccf9cdf8fe4520d9077ae427aa
-
Filesize
31KB
MD5f7b4b3a3249a2767d95f7d39863298c9
SHA188bf2c7aee33d2bcdf3cc3f45d26ef514eb2ab0f
SHA256c8afdb610abab8aba549896e57a7c0b5f78bef8eaf9f9311c1d78c46dd40fc38
SHA51289024a3f1492113ecfd7fb93adeefffee028b0f4c5f8de02801ae73e13e81c6933eae360c21e6a2ea647770178f3ac5d0ae6caccf9cdf8fe4520d9077ae427aa
-
Filesize
31KB
MD5f7b4b3a3249a2767d95f7d39863298c9
SHA188bf2c7aee33d2bcdf3cc3f45d26ef514eb2ab0f
SHA256c8afdb610abab8aba549896e57a7c0b5f78bef8eaf9f9311c1d78c46dd40fc38
SHA51289024a3f1492113ecfd7fb93adeefffee028b0f4c5f8de02801ae73e13e81c6933eae360c21e6a2ea647770178f3ac5d0ae6caccf9cdf8fe4520d9077ae427aa