Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    05/08/2023, 20:43

General

  • Target

    7b480b5e1e4d6d5e8d3bfb095930353c_cryptolocker_JC.exe

  • Size

    45KB

  • MD5

    7b480b5e1e4d6d5e8d3bfb095930353c

  • SHA1

    d5f06d8fe3f62180f35efc3c934c60f289beaa1c

  • SHA256

    d7604e9d8d8731d00584194f3c6c8793cf290c949f4ddcbb103b64a0c47fa15c

  • SHA512

    0a4c677aaee3982e57a6157a0b5e7ac24d8f1ba496cd4dd9cd0aa28836202e7978a867069c346eb83635893689e6805755ac4e2b6ae39ae134043d8944a431fe

  • SSDEEP

    768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpjeJQ7suIlsw92KFXcTA:V6QFElP6n+gMQMOtEvwDpjeJQ7pojac

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\asih.exe
    "C:\Users\Admin\AppData\Local\Temp\asih.exe"
    1⤵
    • Executes dropped EXE
    PID:2856
  • C:\Users\Admin\AppData\Local\Temp\7b480b5e1e4d6d5e8d3bfb095930353c_cryptolocker_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\7b480b5e1e4d6d5e8d3bfb095930353c_cryptolocker_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2424

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    46KB

    MD5

    0418290be62a0b7653cec59474305db8

    SHA1

    4dc98ada3a005a30d98a2dcb1ba783079e1c6173

    SHA256

    88fbc6ad1859e8495bb5c6d0cfadf56168b436f2d367c93eb5f3662abb48f969

    SHA512

    1c1f2b4593b7c16d022e8483ef2684d74842d027e43dfea9b4043603990810967e88037f7bb7bd8cd5030b26eb20303c288a0b0162cbafa2b3e69355b0a56891

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    46KB

    MD5

    0418290be62a0b7653cec59474305db8

    SHA1

    4dc98ada3a005a30d98a2dcb1ba783079e1c6173

    SHA256

    88fbc6ad1859e8495bb5c6d0cfadf56168b436f2d367c93eb5f3662abb48f969

    SHA512

    1c1f2b4593b7c16d022e8483ef2684d74842d027e43dfea9b4043603990810967e88037f7bb7bd8cd5030b26eb20303c288a0b0162cbafa2b3e69355b0a56891

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    46KB

    MD5

    0418290be62a0b7653cec59474305db8

    SHA1

    4dc98ada3a005a30d98a2dcb1ba783079e1c6173

    SHA256

    88fbc6ad1859e8495bb5c6d0cfadf56168b436f2d367c93eb5f3662abb48f969

    SHA512

    1c1f2b4593b7c16d022e8483ef2684d74842d027e43dfea9b4043603990810967e88037f7bb7bd8cd5030b26eb20303c288a0b0162cbafa2b3e69355b0a56891

  • memory/2424-56-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

  • memory/2424-55-0x0000000000250000-0x0000000000256000-memory.dmp

    Filesize

    24KB

  • memory/2424-54-0x0000000000250000-0x0000000000256000-memory.dmp

    Filesize

    24KB

  • memory/2856-70-0x0000000000450000-0x0000000000456000-memory.dmp

    Filesize

    24KB

  • memory/2856-69-0x0000000000420000-0x0000000000426000-memory.dmp

    Filesize

    24KB