Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
05/08/2023, 20:43
Static task
static1
Behavioral task
behavioral1
Sample
7b480b5e1e4d6d5e8d3bfb095930353c_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
7b480b5e1e4d6d5e8d3bfb095930353c_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
7b480b5e1e4d6d5e8d3bfb095930353c_cryptolocker_JC.exe
-
Size
45KB
-
MD5
7b480b5e1e4d6d5e8d3bfb095930353c
-
SHA1
d5f06d8fe3f62180f35efc3c934c60f289beaa1c
-
SHA256
d7604e9d8d8731d00584194f3c6c8793cf290c949f4ddcbb103b64a0c47fa15c
-
SHA512
0a4c677aaee3982e57a6157a0b5e7ac24d8f1ba496cd4dd9cd0aa28836202e7978a867069c346eb83635893689e6805755ac4e2b6ae39ae134043d8944a431fe
-
SSDEEP
768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpjeJQ7suIlsw92KFXcTA:V6QFElP6n+gMQMOtEvwDpjeJQ7pojac
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2856 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2424 7b480b5e1e4d6d5e8d3bfb095930353c_cryptolocker_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2424 wrote to memory of 2856 2424 7b480b5e1e4d6d5e8d3bfb095930353c_cryptolocker_JC.exe 1 PID 2424 wrote to memory of 2856 2424 7b480b5e1e4d6d5e8d3bfb095930353c_cryptolocker_JC.exe 1 PID 2424 wrote to memory of 2856 2424 7b480b5e1e4d6d5e8d3bfb095930353c_cryptolocker_JC.exe 1 PID 2424 wrote to memory of 2856 2424 7b480b5e1e4d6d5e8d3bfb095930353c_cryptolocker_JC.exe 1
Processes
-
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"1⤵
- Executes dropped EXE
PID:2856
-
C:\Users\Admin\AppData\Local\Temp\7b480b5e1e4d6d5e8d3bfb095930353c_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\7b480b5e1e4d6d5e8d3bfb095930353c_cryptolocker_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD50418290be62a0b7653cec59474305db8
SHA14dc98ada3a005a30d98a2dcb1ba783079e1c6173
SHA25688fbc6ad1859e8495bb5c6d0cfadf56168b436f2d367c93eb5f3662abb48f969
SHA5121c1f2b4593b7c16d022e8483ef2684d74842d027e43dfea9b4043603990810967e88037f7bb7bd8cd5030b26eb20303c288a0b0162cbafa2b3e69355b0a56891
-
Filesize
46KB
MD50418290be62a0b7653cec59474305db8
SHA14dc98ada3a005a30d98a2dcb1ba783079e1c6173
SHA25688fbc6ad1859e8495bb5c6d0cfadf56168b436f2d367c93eb5f3662abb48f969
SHA5121c1f2b4593b7c16d022e8483ef2684d74842d027e43dfea9b4043603990810967e88037f7bb7bd8cd5030b26eb20303c288a0b0162cbafa2b3e69355b0a56891
-
Filesize
46KB
MD50418290be62a0b7653cec59474305db8
SHA14dc98ada3a005a30d98a2dcb1ba783079e1c6173
SHA25688fbc6ad1859e8495bb5c6d0cfadf56168b436f2d367c93eb5f3662abb48f969
SHA5121c1f2b4593b7c16d022e8483ef2684d74842d027e43dfea9b4043603990810967e88037f7bb7bd8cd5030b26eb20303c288a0b0162cbafa2b3e69355b0a56891