Analysis

  • max time kernel
    154s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/08/2023, 10:19

General

  • Target

    68cb2d5bb23fc2342262b0a17641db09_cryptolocker_JC.exe

  • Size

    61KB

  • MD5

    68cb2d5bb23fc2342262b0a17641db09

  • SHA1

    d85dacf760b7af6065395a3c31d472d4256fdf39

  • SHA256

    fa50aa6811001122e2a6cf6daa9ff3eedf6c0239b70f83058bb7f76493d6320c

  • SHA512

    6542a93dba415265386d27f5b58ba1d890884eea644854cebf095ac99a6a47682021a936b3d46a7293848b90c64a276a2aeb45678d39ab948be3ddc82d8cc4f6

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYfKhtP5:1nK6a+qdOOtEvwDpjL

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\68cb2d5bb23fc2342262b0a17641db09_cryptolocker_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\68cb2d5bb23fc2342262b0a17641db09_cryptolocker_JC.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1960
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3928

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    61KB

    MD5

    c007045fe1b32b41ae36fd1ec1347a8a

    SHA1

    f3bf0013ae83062712ac7543640eda3ba68cf492

    SHA256

    2a75bd88c4d16e9c8a83abeac66c84dade79a6ffeb456ab8fbdfc5d4ccbbd751

    SHA512

    7f9f8dbf233c55115701f8b5553f2219ddaca3cb6a525a341a48dd9b7975ae16dacc8387f15bd6bf433263147d49add3b2c10682db0379e221a3b0588c662843

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    61KB

    MD5

    c007045fe1b32b41ae36fd1ec1347a8a

    SHA1

    f3bf0013ae83062712ac7543640eda3ba68cf492

    SHA256

    2a75bd88c4d16e9c8a83abeac66c84dade79a6ffeb456ab8fbdfc5d4ccbbd751

    SHA512

    7f9f8dbf233c55115701f8b5553f2219ddaca3cb6a525a341a48dd9b7975ae16dacc8387f15bd6bf433263147d49add3b2c10682db0379e221a3b0588c662843

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    61KB

    MD5

    c007045fe1b32b41ae36fd1ec1347a8a

    SHA1

    f3bf0013ae83062712ac7543640eda3ba68cf492

    SHA256

    2a75bd88c4d16e9c8a83abeac66c84dade79a6ffeb456ab8fbdfc5d4ccbbd751

    SHA512

    7f9f8dbf233c55115701f8b5553f2219ddaca3cb6a525a341a48dd9b7975ae16dacc8387f15bd6bf433263147d49add3b2c10682db0379e221a3b0588c662843

  • memory/1960-133-0x0000000000500000-0x000000000050F311-memory.dmp

    Filesize

    60KB

  • memory/1960-134-0x0000000000500000-0x000000000050F311-memory.dmp

    Filesize

    60KB

  • memory/1960-135-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/1960-136-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/1960-137-0x00000000006C0000-0x00000000006C6000-memory.dmp

    Filesize

    24KB

  • memory/1960-158-0x0000000000500000-0x000000000050F311-memory.dmp

    Filesize

    60KB

  • memory/3928-159-0x0000000000500000-0x000000000050F311-memory.dmp

    Filesize

    60KB