Analysis

  • max time kernel
    131s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    06/08/2023, 12:06

General

  • Target

    871193a8dbe9f3082750f346e9832e78_cryptolocker_JC.exe

  • Size

    82KB

  • MD5

    871193a8dbe9f3082750f346e9832e78

  • SHA1

    9e4b6f29cc79c0042f5e25451497864e6b64ca3c

  • SHA256

    bad0fe72537e627a2f9c83e350382c6231ae806f761c98fa90a23fdf2a016b36

  • SHA512

    cff08a0049e02d6b13066fd0190d45223e5d104fc5a88b848b5f0b6f8e1eaf416393d3be5692ad74b901bb06c04a08f5b231f434a2cceba6240f885710306de6

  • SSDEEP

    1536:vj+jsMQMOtEvwDpj5H8u8rBN6nqEZNi1OkQ+:vCjsIOtEvwDpj5H8zPsM

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\871193a8dbe9f3082750f346e9832e78_cryptolocker_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\871193a8dbe9f3082750f346e9832e78_cryptolocker_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2816

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\misid.exe

          Filesize

          82KB

          MD5

          3349c6301935fdd3c08f3cf42520ea9f

          SHA1

          ca08087cbfcef8968f601145141a43b0bf15b86a

          SHA256

          d7ecad0076f6e454c2e9810eed124925d47d8960ef6c03d7c1e34eaa79a414fc

          SHA512

          f5423b43489bb1e608139e53f3f298dd77265b863bcf94755fc60aa24d39ecf9b523d1d724b4146cfc790fc2c3a194141cbf8e25845955312d005941185f2085

        • C:\Users\Admin\AppData\Local\Temp\misid.exe

          Filesize

          82KB

          MD5

          3349c6301935fdd3c08f3cf42520ea9f

          SHA1

          ca08087cbfcef8968f601145141a43b0bf15b86a

          SHA256

          d7ecad0076f6e454c2e9810eed124925d47d8960ef6c03d7c1e34eaa79a414fc

          SHA512

          f5423b43489bb1e608139e53f3f298dd77265b863bcf94755fc60aa24d39ecf9b523d1d724b4146cfc790fc2c3a194141cbf8e25845955312d005941185f2085

        • \Users\Admin\AppData\Local\Temp\misid.exe

          Filesize

          82KB

          MD5

          3349c6301935fdd3c08f3cf42520ea9f

          SHA1

          ca08087cbfcef8968f601145141a43b0bf15b86a

          SHA256

          d7ecad0076f6e454c2e9810eed124925d47d8960ef6c03d7c1e34eaa79a414fc

          SHA512

          f5423b43489bb1e608139e53f3f298dd77265b863bcf94755fc60aa24d39ecf9b523d1d724b4146cfc790fc2c3a194141cbf8e25845955312d005941185f2085

        • memory/2020-54-0x00000000004D0000-0x00000000004D6000-memory.dmp

          Filesize

          24KB

        • memory/2020-55-0x0000000000600000-0x0000000000606000-memory.dmp

          Filesize

          24KB

        • memory/2020-58-0x00000000004D0000-0x00000000004D6000-memory.dmp

          Filesize

          24KB

        • memory/2816-70-0x0000000000380000-0x0000000000386000-memory.dmp

          Filesize

          24KB

        • memory/2816-69-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB