Analysis

  • max time kernel
    160s
  • max time network
    177s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    05-08-2023 13:54

General

  • Target

    744f5f3f36db859c9d31a3b3ded73a88_cryptolocker_JC.exe

  • Size

    85KB

  • MD5

    744f5f3f36db859c9d31a3b3ded73a88

  • SHA1

    fabb488babf9fc54efedf1287beb4a9856e36e31

  • SHA256

    b1d2c5427f744eab4820a4efd452085c2802ae73d8034c8897ef930bd7c4b210

  • SHA512

    5d5e46309ae82688c457c886043e2fd3dbba8bdc362ecaf5530ae394d9428fb4fbf611e3db9617d0264e54ef056e8580238a902b957fb67f89d91e1acc81e5e5

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjQGYQbNcqamvWg:V6a+pOtEvwDpjtt

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\744f5f3f36db859c9d31a3b3ded73a88_cryptolocker_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\744f5f3f36db859c9d31a3b3ded73a88_cryptolocker_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2528
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    85KB

    MD5

    ac225874c9bdc5102fd175b041236189

    SHA1

    1686e6750ebf360fdad53a78b23a93008ae92b7b

    SHA256

    3f0bcccc4416f610475f87030457300a795b40ec411fe6c1897fae0d9b1c72f6

    SHA512

    eb564f5dce1bfb1c7f62657d361773e123dc1427d7bdc9104ded1749293489f0d848f0d825dc44d245c66c1c7099f1a4252d556447cc23ce26d955bafed5c8be

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    85KB

    MD5

    ac225874c9bdc5102fd175b041236189

    SHA1

    1686e6750ebf360fdad53a78b23a93008ae92b7b

    SHA256

    3f0bcccc4416f610475f87030457300a795b40ec411fe6c1897fae0d9b1c72f6

    SHA512

    eb564f5dce1bfb1c7f62657d361773e123dc1427d7bdc9104ded1749293489f0d848f0d825dc44d245c66c1c7099f1a4252d556447cc23ce26d955bafed5c8be

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    85KB

    MD5

    ac225874c9bdc5102fd175b041236189

    SHA1

    1686e6750ebf360fdad53a78b23a93008ae92b7b

    SHA256

    3f0bcccc4416f610475f87030457300a795b40ec411fe6c1897fae0d9b1c72f6

    SHA512

    eb564f5dce1bfb1c7f62657d361773e123dc1427d7bdc9104ded1749293489f0d848f0d825dc44d245c66c1c7099f1a4252d556447cc23ce26d955bafed5c8be

  • memory/2528-54-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2528-56-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2528-55-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB

  • memory/2984-70-0x0000000000330000-0x0000000000336000-memory.dmp

    Filesize

    24KB

  • memory/2984-69-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB