Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
05/08/2023, 20:51
Behavioral task
behavioral1
Sample
7c095b31ff266b4ffed23e4f704ecf84_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
7c095b31ff266b4ffed23e4f704ecf84_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
7c095b31ff266b4ffed23e4f704ecf84_cryptolocker_JC.exe
-
Size
97KB
-
MD5
7c095b31ff266b4ffed23e4f704ecf84
-
SHA1
cdab462544a8992b9f938b8bad8cb24bdf02b2db
-
SHA256
aba6a23e458080999d9ec4bd4e5acf4051666283ec6b96137aa53cd75e627aaa
-
SHA512
808c6efaec6ea1f7dfe984c0c960366db9011cb2dc7954c7bf6dcf678b699979851f6967bde3a06ef7077047a13741ebd76e4ff51e87626ece19cabeabfdf9d2
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQbCJjM1:AnBdOOtEvwDpj6zd
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2476 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1120 7c095b31ff266b4ffed23e4f704ecf84_cryptolocker_JC.exe -
resource yara_rule behavioral1/memory/1120-54-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/files/0x00080000000120e6-65.dat upx behavioral1/files/0x00080000000120e6-68.dat upx behavioral1/memory/1120-69-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/memory/2476-70-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/files/0x00080000000120e6-79.dat upx behavioral1/memory/2476-80-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1120 wrote to memory of 2476 1120 7c095b31ff266b4ffed23e4f704ecf84_cryptolocker_JC.exe 28 PID 1120 wrote to memory of 2476 1120 7c095b31ff266b4ffed23e4f704ecf84_cryptolocker_JC.exe 28 PID 1120 wrote to memory of 2476 1120 7c095b31ff266b4ffed23e4f704ecf84_cryptolocker_JC.exe 28 PID 1120 wrote to memory of 2476 1120 7c095b31ff266b4ffed23e4f704ecf84_cryptolocker_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c095b31ff266b4ffed23e4f704ecf84_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\7c095b31ff266b4ffed23e4f704ecf84_cryptolocker_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97KB
MD5fbcdb66c955c1db7e29a7e474928a161
SHA19685cc34983e1f0ce5fb5630a41cb27d3039486a
SHA256afb3b6103959d891bfca7c00b0a78f5c0afc346dc26f3f2e6066275fe283ee48
SHA5126e8f95f237825b76ef731648f4e474be0623524a3707289f318a254fb7b6a1a0abe14e6b01e8f907cabd14b5c15252c457808fc7379324feba3ec1fa85e1d1de
-
Filesize
97KB
MD5fbcdb66c955c1db7e29a7e474928a161
SHA19685cc34983e1f0ce5fb5630a41cb27d3039486a
SHA256afb3b6103959d891bfca7c00b0a78f5c0afc346dc26f3f2e6066275fe283ee48
SHA5126e8f95f237825b76ef731648f4e474be0623524a3707289f318a254fb7b6a1a0abe14e6b01e8f907cabd14b5c15252c457808fc7379324feba3ec1fa85e1d1de
-
Filesize
97KB
MD5fbcdb66c955c1db7e29a7e474928a161
SHA19685cc34983e1f0ce5fb5630a41cb27d3039486a
SHA256afb3b6103959d891bfca7c00b0a78f5c0afc346dc26f3f2e6066275fe283ee48
SHA5126e8f95f237825b76ef731648f4e474be0623524a3707289f318a254fb7b6a1a0abe14e6b01e8f907cabd14b5c15252c457808fc7379324feba3ec1fa85e1d1de