Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
06/08/2023, 15:58
Static task
static1
Behavioral task
behavioral1
Sample
8e1aa0013f4b30199624e3736562e37d_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
8e1aa0013f4b30199624e3736562e37d_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
8e1aa0013f4b30199624e3736562e37d_cryptolocker_JC.exe
-
Size
44KB
-
MD5
8e1aa0013f4b30199624e3736562e37d
-
SHA1
1a4df0b02f7905dd3b52687f2fa3b31506daed16
-
SHA256
5c44fb187a1a42d69a341d9f042dc649d1beb325ed622f3425e4cd7581704955
-
SHA512
e70d044a22b5e4cd1e4b35684d83a8242ed1dedb54eec527b08ca34887a36b3468efc2481b87aeab5855457f15dd4e2cd2d96d35cf55fceec5104c25d837c071
-
SSDEEP
768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4/Uth8igNrr46xdUU/:vj+jsMQMOtEvwDpj5Hczer5ik
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1740 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2216 8e1aa0013f4b30199624e3736562e37d_cryptolocker_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2216 wrote to memory of 1740 2216 8e1aa0013f4b30199624e3736562e37d_cryptolocker_JC.exe 28 PID 2216 wrote to memory of 1740 2216 8e1aa0013f4b30199624e3736562e37d_cryptolocker_JC.exe 28 PID 2216 wrote to memory of 1740 2216 8e1aa0013f4b30199624e3736562e37d_cryptolocker_JC.exe 28 PID 2216 wrote to memory of 1740 2216 8e1aa0013f4b30199624e3736562e37d_cryptolocker_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e1aa0013f4b30199624e3736562e37d_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\8e1aa0013f4b30199624e3736562e37d_cryptolocker_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:1740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5c2f847fef7341ba2ba6d2a317421344f
SHA1a4f466abdc641cca0a4d0119b462832fec649c17
SHA2564db8040c1fde011474baa97d6c108a1641c07e18784e24671def4ea0fd834cba
SHA512fbfbe14d14a827cd4edc79864173ce993544d137a446aa188c007927fb1e037d4fb352ba0d8d88ba8326abc564680a1cd88d3b0c673009436272597f70007b18
-
Filesize
44KB
MD5c2f847fef7341ba2ba6d2a317421344f
SHA1a4f466abdc641cca0a4d0119b462832fec649c17
SHA2564db8040c1fde011474baa97d6c108a1641c07e18784e24671def4ea0fd834cba
SHA512fbfbe14d14a827cd4edc79864173ce993544d137a446aa188c007927fb1e037d4fb352ba0d8d88ba8326abc564680a1cd88d3b0c673009436272597f70007b18
-
Filesize
44KB
MD5c2f847fef7341ba2ba6d2a317421344f
SHA1a4f466abdc641cca0a4d0119b462832fec649c17
SHA2564db8040c1fde011474baa97d6c108a1641c07e18784e24671def4ea0fd834cba
SHA512fbfbe14d14a827cd4edc79864173ce993544d137a446aa188c007927fb1e037d4fb352ba0d8d88ba8326abc564680a1cd88d3b0c673009436272597f70007b18