Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
05-08-2023 11:36
Behavioral task
behavioral1
Sample
6eb1fb3452ac2b4a3d03655147130bdb_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
6eb1fb3452ac2b4a3d03655147130bdb_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
6eb1fb3452ac2b4a3d03655147130bdb_cryptolocker_JC.exe
-
Size
112KB
-
MD5
6eb1fb3452ac2b4a3d03655147130bdb
-
SHA1
221e87cdee827aad6c14c2de027527a276a07308
-
SHA256
3b449b616626d818540a1e2c25a5ebbbc2ed4a50ffaba3e0e25cb6d90c8f67df
-
SHA512
97dc2b1fccbdd25fdd08baa8eadcfb964d6f0dbd97a5315a1789c31482ea99c94a0c02947068bc9fa29eb2a95266cf71c29eb8a5e9cafa515f3dbd18eef8d7b0
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699G/Tg:AnBdOOtEvwDpj6z1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2488 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2224 6eb1fb3452ac2b4a3d03655147130bdb_cryptolocker_JC.exe -
resource yara_rule behavioral1/memory/2224-54-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/memory/2224-69-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/files/0x0008000000012028-70.dat upx behavioral1/files/0x0008000000012028-65.dat upx behavioral1/files/0x0008000000012028-79.dat upx behavioral1/memory/2488-80-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2488 2224 6eb1fb3452ac2b4a3d03655147130bdb_cryptolocker_JC.exe 28 PID 2224 wrote to memory of 2488 2224 6eb1fb3452ac2b4a3d03655147130bdb_cryptolocker_JC.exe 28 PID 2224 wrote to memory of 2488 2224 6eb1fb3452ac2b4a3d03655147130bdb_cryptolocker_JC.exe 28 PID 2224 wrote to memory of 2488 2224 6eb1fb3452ac2b4a3d03655147130bdb_cryptolocker_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\6eb1fb3452ac2b4a3d03655147130bdb_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\6eb1fb3452ac2b4a3d03655147130bdb_cryptolocker_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112KB
MD5953f0dc1c98dcad2555c79fae82452b8
SHA1586911bd1667179834d679c7fe4fbda112ebba07
SHA256502fcca696f4d5d4bf3ca05198815c2742dd5387cccd97d69a2b230939a3fd56
SHA512b41a5cad1d26feb083737d572ebacecc5b02924635d40b35b565df4b2762475af64d458483f831a538ae94dd9b7b8e10c1c4136ee7dc6b1255782951707c667c
-
Filesize
112KB
MD5953f0dc1c98dcad2555c79fae82452b8
SHA1586911bd1667179834d679c7fe4fbda112ebba07
SHA256502fcca696f4d5d4bf3ca05198815c2742dd5387cccd97d69a2b230939a3fd56
SHA512b41a5cad1d26feb083737d572ebacecc5b02924635d40b35b565df4b2762475af64d458483f831a538ae94dd9b7b8e10c1c4136ee7dc6b1255782951707c667c
-
Filesize
112KB
MD5953f0dc1c98dcad2555c79fae82452b8
SHA1586911bd1667179834d679c7fe4fbda112ebba07
SHA256502fcca696f4d5d4bf3ca05198815c2742dd5387cccd97d69a2b230939a3fd56
SHA512b41a5cad1d26feb083737d572ebacecc5b02924635d40b35b565df4b2762475af64d458483f831a538ae94dd9b7b8e10c1c4136ee7dc6b1255782951707c667c