Analysis
-
max time kernel
133s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
05-08-2023 13:02
Static task
static1
Behavioral task
behavioral1
Sample
6fde863cc2d7e5f285f95462c23d7be8_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
6fde863cc2d7e5f285f95462c23d7be8_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
6fde863cc2d7e5f285f95462c23d7be8_cryptolocker_JC.exe
-
Size
51KB
-
MD5
6fde863cc2d7e5f285f95462c23d7be8
-
SHA1
c25c4e9c26b8e7a4e861f006acdb6e8a50fbe000
-
SHA256
d30f0706c305bfd1f8cdac5044ea39b64a2ed70b6ede345203d098ae87a90d5e
-
SHA512
3ee19a036886b5876793ba9c5ab962a4dfeb18590d345b69c9bcc6db5b62a80f3994c8ecebadb9052658a68a5ec0c3e2659e60d9a0b8a77147b7ab3ea7be5b8c
-
SSDEEP
768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqPOYRmNxt5IXfasJ:6j+1NMOtEvwDpjr8ox8XV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2800 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2588 6fde863cc2d7e5f285f95462c23d7be8_cryptolocker_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2588 wrote to memory of 2800 2588 6fde863cc2d7e5f285f95462c23d7be8_cryptolocker_JC.exe 28 PID 2588 wrote to memory of 2800 2588 6fde863cc2d7e5f285f95462c23d7be8_cryptolocker_JC.exe 28 PID 2588 wrote to memory of 2800 2588 6fde863cc2d7e5f285f95462c23d7be8_cryptolocker_JC.exe 28 PID 2588 wrote to memory of 2800 2588 6fde863cc2d7e5f285f95462c23d7be8_cryptolocker_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fde863cc2d7e5f285f95462c23d7be8_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\6fde863cc2d7e5f285f95462c23d7be8_cryptolocker_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD5df71baefd914217a3f225345abf0d0e0
SHA153a9e1ec6c002d4b8d1eae2e163a8c9d32b14074
SHA25616c673e89b0d76e8b120ee2d4fdc55d50a35221a37ccab21c5a545b260baeb51
SHA512a60ebbde9b4972daddcf2be0d196734c29e39b6893f2e162ba1f8ba3986891df648b6bfffeba97dcb220d01f287e11295d63ee6c5ab1f964a1747bc53b888605
-
Filesize
52KB
MD5df71baefd914217a3f225345abf0d0e0
SHA153a9e1ec6c002d4b8d1eae2e163a8c9d32b14074
SHA25616c673e89b0d76e8b120ee2d4fdc55d50a35221a37ccab21c5a545b260baeb51
SHA512a60ebbde9b4972daddcf2be0d196734c29e39b6893f2e162ba1f8ba3986891df648b6bfffeba97dcb220d01f287e11295d63ee6c5ab1f964a1747bc53b888605
-
Filesize
52KB
MD5df71baefd914217a3f225345abf0d0e0
SHA153a9e1ec6c002d4b8d1eae2e163a8c9d32b14074
SHA25616c673e89b0d76e8b120ee2d4fdc55d50a35221a37ccab21c5a545b260baeb51
SHA512a60ebbde9b4972daddcf2be0d196734c29e39b6893f2e162ba1f8ba3986891df648b6bfffeba97dcb220d01f287e11295d63ee6c5ab1f964a1747bc53b888605