Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/08/2023, 10:49

General

  • Target

    6af88e7fbf9a8a1ac882b101acbdd5bc_cryptolocker_JC.exe

  • Size

    137KB

  • MD5

    6af88e7fbf9a8a1ac882b101acbdd5bc

  • SHA1

    2a29707d1257e30dc4b9684a007f3580202eaaaa

  • SHA256

    b1d69f71c7794dbfa0abb70e4a033969b460407d68c971102f69214812235dd4

  • SHA512

    4dfbed3886b2165a0ab239d2e889fbd3afd3a0e48c648e83339f1a1f3c4c12ff4c1fdf043ac948d076c906996e6d6cd415369ce6f39e34126e1ba10b784bee67

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699G/T6:z6a+CdOOtEvwDpjczr

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6af88e7fbf9a8a1ac882b101acbdd5bc_cryptolocker_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\6af88e7fbf9a8a1ac882b101acbdd5bc_cryptolocker_JC.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4460
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    137KB

    MD5

    3a70bf2e0413a64573d960ff227fa979

    SHA1

    e140ca59c2a2f22cd76194396134451c75415a7f

    SHA256

    f7cac8b0a410a79b3009609d4ff943f022210fc93e074af173ef0e5674353d91

    SHA512

    c280d6bf8689b35bcd7372d558d1e83852b103d2b338eee15df6071a7510bf6819c5a66ca09029281749bec5f11848e9eacb9fbcc7fb8c7c962e6ced5e1cce32

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    137KB

    MD5

    3a70bf2e0413a64573d960ff227fa979

    SHA1

    e140ca59c2a2f22cd76194396134451c75415a7f

    SHA256

    f7cac8b0a410a79b3009609d4ff943f022210fc93e074af173ef0e5674353d91

    SHA512

    c280d6bf8689b35bcd7372d558d1e83852b103d2b338eee15df6071a7510bf6819c5a66ca09029281749bec5f11848e9eacb9fbcc7fb8c7c962e6ced5e1cce32

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    137KB

    MD5

    3a70bf2e0413a64573d960ff227fa979

    SHA1

    e140ca59c2a2f22cd76194396134451c75415a7f

    SHA256

    f7cac8b0a410a79b3009609d4ff943f022210fc93e074af173ef0e5674353d91

    SHA512

    c280d6bf8689b35bcd7372d558d1e83852b103d2b338eee15df6071a7510bf6819c5a66ca09029281749bec5f11848e9eacb9fbcc7fb8c7c962e6ced5e1cce32

  • memory/1692-153-0x0000000002060000-0x0000000002066000-memory.dmp

    Filesize

    24KB

  • memory/1692-152-0x0000000002080000-0x0000000002086000-memory.dmp

    Filesize

    24KB

  • memory/1692-159-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/4460-133-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/4460-134-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/4460-135-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/4460-136-0x00000000006C0000-0x00000000006C6000-memory.dmp

    Filesize

    24KB

  • memory/4460-151-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB