Analysis
-
max time kernel
134s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
04/08/2023, 15:45
Static task
static1
Behavioral task
behavioral1
Sample
5c613f70660b170e7c8ee669b5ca17fa_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
5c613f70660b170e7c8ee669b5ca17fa_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
5c613f70660b170e7c8ee669b5ca17fa_cryptolocker_JC.exe
-
Size
64KB
-
MD5
5c613f70660b170e7c8ee669b5ca17fa
-
SHA1
a34ca419b66e9ce5d051fec3670bbe5c10ccc26f
-
SHA256
3e2e78a26d28590c6f7060634700475927158396b49c00b8cd1ad964b061c9fe
-
SHA512
327e3d6a039c6da4ef23ee0e8f6a89fffd7bbda0956a16dd032e8cf0745152656b9d98c5e90ea0d10947e9c109429e3af237dda142071188c55be396a2587d2d
-
SSDEEP
768:79inqyNR/QtOOtEvwDpjBK/iVTab3GRuv3VyldjsASh8yGuF:79mqyNhQMOtEvwDpjBPY7xv3gnQey/F
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 756 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2464 5c613f70660b170e7c8ee669b5ca17fa_cryptolocker_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2464 wrote to memory of 756 2464 5c613f70660b170e7c8ee669b5ca17fa_cryptolocker_JC.exe 30 PID 2464 wrote to memory of 756 2464 5c613f70660b170e7c8ee669b5ca17fa_cryptolocker_JC.exe 30 PID 2464 wrote to memory of 756 2464 5c613f70660b170e7c8ee669b5ca17fa_cryptolocker_JC.exe 30 PID 2464 wrote to memory of 756 2464 5c613f70660b170e7c8ee669b5ca17fa_cryptolocker_JC.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c613f70660b170e7c8ee669b5ca17fa_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\5c613f70660b170e7c8ee669b5ca17fa_cryptolocker_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5c1353a9585a9342a700bb28ecb101b01
SHA13518c37c30566a561a559b3117c1acaaa15fb5ac
SHA2563f3dda97f6eccd1fb6bd7121d7da3c3de5082f58eafefb2bbbaebc7b8e69a507
SHA51235b006eefe75aca8eaa3f129ea97158ec9b74176a8999de2f19f2528251b7ff31b7736c8f6fd02d4b5a38b1442a5292d2d9a782db49d3dbd23c53a3e118ae2c7
-
Filesize
64KB
MD5c1353a9585a9342a700bb28ecb101b01
SHA13518c37c30566a561a559b3117c1acaaa15fb5ac
SHA2563f3dda97f6eccd1fb6bd7121d7da3c3de5082f58eafefb2bbbaebc7b8e69a507
SHA51235b006eefe75aca8eaa3f129ea97158ec9b74176a8999de2f19f2528251b7ff31b7736c8f6fd02d4b5a38b1442a5292d2d9a782db49d3dbd23c53a3e118ae2c7
-
Filesize
64KB
MD5c1353a9585a9342a700bb28ecb101b01
SHA13518c37c30566a561a559b3117c1acaaa15fb5ac
SHA2563f3dda97f6eccd1fb6bd7121d7da3c3de5082f58eafefb2bbbaebc7b8e69a507
SHA51235b006eefe75aca8eaa3f129ea97158ec9b74176a8999de2f19f2528251b7ff31b7736c8f6fd02d4b5a38b1442a5292d2d9a782db49d3dbd23c53a3e118ae2c7