Analysis
-
max time kernel
136s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
06/08/2023, 15:59
Static task
static1
Behavioral task
behavioral1
Sample
8e26fd9a2eb4f7479bf5daf01ec97a58_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
8e26fd9a2eb4f7479bf5daf01ec97a58_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
8e26fd9a2eb4f7479bf5daf01ec97a58_cryptolocker_JC.exe
-
Size
142KB
-
MD5
8e26fd9a2eb4f7479bf5daf01ec97a58
-
SHA1
662c06f1f97feb987faac21a64b91e9f61c6bbcf
-
SHA256
e15f4243a9699c6a4f48f7381c7eb4ccca50a56ee71e7c7e6f4cbab6a801241d
-
SHA512
7d7d7c05db9a97a7ee7763c363f945ce56bbe49d7ec4766078ab2c336621ca5c9be651d91b61512f9ceea4bf26d0306cb2d69c5c431ca1fcf32d73b4facb2588
-
SSDEEP
1536:V6QFElP6n+gMQMOtEvwDpjQGYQbxGYQbxGYQbPlooNY:V6a+pOtEvwDpjt22k
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2016 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1936 8e26fd9a2eb4f7479bf5daf01ec97a58_cryptolocker_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2016 1936 8e26fd9a2eb4f7479bf5daf01ec97a58_cryptolocker_JC.exe 28 PID 1936 wrote to memory of 2016 1936 8e26fd9a2eb4f7479bf5daf01ec97a58_cryptolocker_JC.exe 28 PID 1936 wrote to memory of 2016 1936 8e26fd9a2eb4f7479bf5daf01ec97a58_cryptolocker_JC.exe 28 PID 1936 wrote to memory of 2016 1936 8e26fd9a2eb4f7479bf5daf01ec97a58_cryptolocker_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e26fd9a2eb4f7479bf5daf01ec97a58_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\8e26fd9a2eb4f7479bf5daf01ec97a58_cryptolocker_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
142KB
MD5829733835c69fd392abb27fcd2cac1a5
SHA1a664eeeb1e12280f19a0f60d442bfb771b0047b9
SHA25658fb2fcd3608cd14c82673064ee56fc9d5db4358180a41ad94e1bee9fed7ad82
SHA512720e936652ffdb994183cf5af3cfecc1d5f9824531c1e43d024bade6065bbc013b92b8846032263c8427408c43b50fa18729b558e81a151a252ad322bac8928f
-
Filesize
142KB
MD5829733835c69fd392abb27fcd2cac1a5
SHA1a664eeeb1e12280f19a0f60d442bfb771b0047b9
SHA25658fb2fcd3608cd14c82673064ee56fc9d5db4358180a41ad94e1bee9fed7ad82
SHA512720e936652ffdb994183cf5af3cfecc1d5f9824531c1e43d024bade6065bbc013b92b8846032263c8427408c43b50fa18729b558e81a151a252ad322bac8928f
-
Filesize
142KB
MD5829733835c69fd392abb27fcd2cac1a5
SHA1a664eeeb1e12280f19a0f60d442bfb771b0047b9
SHA25658fb2fcd3608cd14c82673064ee56fc9d5db4358180a41ad94e1bee9fed7ad82
SHA512720e936652ffdb994183cf5af3cfecc1d5f9824531c1e43d024bade6065bbc013b92b8846032263c8427408c43b50fa18729b558e81a151a252ad322bac8928f