Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
03/08/2023, 18:38
Static task
static1
Behavioral task
behavioral1
Sample
568ee6d55c61286dda88529ba9f9a5ca_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
568ee6d55c61286dda88529ba9f9a5ca_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
568ee6d55c61286dda88529ba9f9a5ca_cryptolocker_JC.exe
-
Size
74KB
-
MD5
568ee6d55c61286dda88529ba9f9a5ca
-
SHA1
725845aef11cbe1ebb9015c2c52b9b1ef628bcb1
-
SHA256
6954dc2a51e461f7b97bc6b19ccff367561b159c58fd6861166d9434d80df20b
-
SHA512
ac9989484620c691f6fd808ee8be707324ccb496e4feaba44b81e24eac0f58cbed0667d38118df703ee64902256f1b18f0504c792084c7861bbce369630dc1d4
-
SSDEEP
768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLa5VccPtNw5CS95B:V6QFElP6n+gMQMOtEvwDpjyaLccVNlM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2824 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2180 568ee6d55c61286dda88529ba9f9a5ca_cryptolocker_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2824 2180 568ee6d55c61286dda88529ba9f9a5ca_cryptolocker_JC.exe 28 PID 2180 wrote to memory of 2824 2180 568ee6d55c61286dda88529ba9f9a5ca_cryptolocker_JC.exe 28 PID 2180 wrote to memory of 2824 2180 568ee6d55c61286dda88529ba9f9a5ca_cryptolocker_JC.exe 28 PID 2180 wrote to memory of 2824 2180 568ee6d55c61286dda88529ba9f9a5ca_cryptolocker_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\568ee6d55c61286dda88529ba9f9a5ca_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\568ee6d55c61286dda88529ba9f9a5ca_cryptolocker_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD51236af5956a9e8677abc9121851e8809
SHA1dc230cf1d77cde3ea6e9e63300652517ffffb615
SHA256130d193700d8e056774b3d87eaceba2ed490826905b53593debcf369ff5334cf
SHA512fe3c5988415f2b5f763c48d35f354f9083bdb9324f08cb5f544f4d33e93d42740339bcacaeadbe1ae7ff5bae5203f1f0e6f6c813a88d1196eb32ae71ee6729cd
-
Filesize
74KB
MD51236af5956a9e8677abc9121851e8809
SHA1dc230cf1d77cde3ea6e9e63300652517ffffb615
SHA256130d193700d8e056774b3d87eaceba2ed490826905b53593debcf369ff5334cf
SHA512fe3c5988415f2b5f763c48d35f354f9083bdb9324f08cb5f544f4d33e93d42740339bcacaeadbe1ae7ff5bae5203f1f0e6f6c813a88d1196eb32ae71ee6729cd
-
Filesize
74KB
MD51236af5956a9e8677abc9121851e8809
SHA1dc230cf1d77cde3ea6e9e63300652517ffffb615
SHA256130d193700d8e056774b3d87eaceba2ed490826905b53593debcf369ff5334cf
SHA512fe3c5988415f2b5f763c48d35f354f9083bdb9324f08cb5f544f4d33e93d42740339bcacaeadbe1ae7ff5bae5203f1f0e6f6c813a88d1196eb32ae71ee6729cd