Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2023, 19:31
Static task
static1
Behavioral task
behavioral1
Sample
460d69139511072104a574003de20357_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
460d69139511072104a574003de20357_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
460d69139511072104a574003de20357_cryptolocker_JC.exe
-
Size
30KB
-
MD5
460d69139511072104a574003de20357
-
SHA1
81cf7182913bb045d283f1fb268ced0e026094c9
-
SHA256
dd92137e557558d4b865881ff9ee6517ad049cc421ca06c40da972c3eee8cba2
-
SHA512
43df1045d20de09da53b26780de043ed5a79bbf68710017a6ec6403430fcb3388a7898c9f93539eef36a2b89083f3ea12a38368a4548582663887a6b680d3c0e
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBjML1:X6QFElP6n+gJQMOtEvwDpjBe1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4004 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3028 wrote to memory of 4004 3028 460d69139511072104a574003de20357_cryptolocker_JC.exe 85 PID 3028 wrote to memory of 4004 3028 460d69139511072104a574003de20357_cryptolocker_JC.exe 85 PID 3028 wrote to memory of 4004 3028 460d69139511072104a574003de20357_cryptolocker_JC.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\460d69139511072104a574003de20357_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\460d69139511072104a574003de20357_cryptolocker_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:4004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5f7b4b3a3249a2767d95f7d39863298c9
SHA188bf2c7aee33d2bcdf3cc3f45d26ef514eb2ab0f
SHA256c8afdb610abab8aba549896e57a7c0b5f78bef8eaf9f9311c1d78c46dd40fc38
SHA51289024a3f1492113ecfd7fb93adeefffee028b0f4c5f8de02801ae73e13e81c6933eae360c21e6a2ea647770178f3ac5d0ae6caccf9cdf8fe4520d9077ae427aa
-
Filesize
31KB
MD5f7b4b3a3249a2767d95f7d39863298c9
SHA188bf2c7aee33d2bcdf3cc3f45d26ef514eb2ab0f
SHA256c8afdb610abab8aba549896e57a7c0b5f78bef8eaf9f9311c1d78c46dd40fc38
SHA51289024a3f1492113ecfd7fb93adeefffee028b0f4c5f8de02801ae73e13e81c6933eae360c21e6a2ea647770178f3ac5d0ae6caccf9cdf8fe4520d9077ae427aa
-
Filesize
31KB
MD5f7b4b3a3249a2767d95f7d39863298c9
SHA188bf2c7aee33d2bcdf3cc3f45d26ef514eb2ab0f
SHA256c8afdb610abab8aba549896e57a7c0b5f78bef8eaf9f9311c1d78c46dd40fc38
SHA51289024a3f1492113ecfd7fb93adeefffee028b0f4c5f8de02801ae73e13e81c6933eae360c21e6a2ea647770178f3ac5d0ae6caccf9cdf8fe4520d9077ae427aa