Analysis

  • max time kernel
    134s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    05/08/2023, 20:13

General

  • Target

    791b2fa88bbba4923c2d6705ea5f7dd5_cryptolocker_JC.exe

  • Size

    55KB

  • MD5

    791b2fa88bbba4923c2d6705ea5f7dd5

  • SHA1

    530402bf97761037b81cba81252cd306ec8f1318

  • SHA256

    22e08c009776bd4bf1904cc11324fda25fadf2dd0491907eae5963f6df52b15c

  • SHA512

    4030be65b5214b4197231fb9459b4c4b9866dc0c827b97a0629ee3e02244078c703a69fa82543287a7ee213466ed587b40254ca6937990669e0e4251756fd95f

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjyaLccCKdulcgO9uV68:V6a+pOtEvwDpjv9C

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\791b2fa88bbba4923c2d6705ea5f7dd5_cryptolocker_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\791b2fa88bbba4923c2d6705ea5f7dd5_cryptolocker_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2580
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2484

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    55KB

    MD5

    40999e243b7af88659ccb3b3f986f6dd

    SHA1

    a9ac3492fc478fa5e245962215302884a3a8fd76

    SHA256

    c7769348063017dca95176ddc4961e366c24af2b323b5aa7b8a16b616990076e

    SHA512

    2b79923a3b756762279c90abbf6a38be2bb2bd76a6bf0661fbc932321ef0a1355afd5e36e3706b22e12cc521eea51dc372ef26db82f1c75c6447ce3b8069364a

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    55KB

    MD5

    40999e243b7af88659ccb3b3f986f6dd

    SHA1

    a9ac3492fc478fa5e245962215302884a3a8fd76

    SHA256

    c7769348063017dca95176ddc4961e366c24af2b323b5aa7b8a16b616990076e

    SHA512

    2b79923a3b756762279c90abbf6a38be2bb2bd76a6bf0661fbc932321ef0a1355afd5e36e3706b22e12cc521eea51dc372ef26db82f1c75c6447ce3b8069364a

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    55KB

    MD5

    40999e243b7af88659ccb3b3f986f6dd

    SHA1

    a9ac3492fc478fa5e245962215302884a3a8fd76

    SHA256

    c7769348063017dca95176ddc4961e366c24af2b323b5aa7b8a16b616990076e

    SHA512

    2b79923a3b756762279c90abbf6a38be2bb2bd76a6bf0661fbc932321ef0a1355afd5e36e3706b22e12cc521eea51dc372ef26db82f1c75c6447ce3b8069364a

  • memory/2484-69-0x0000000000270000-0x0000000000276000-memory.dmp

    Filesize

    24KB

  • memory/2580-54-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2580-55-0x0000000000470000-0x0000000000476000-memory.dmp

    Filesize

    24KB

  • memory/2580-56-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB