Analysis
-
max time kernel
138s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08/08/2023, 14:55
Static task
static1
Behavioral task
behavioral1
Sample
947519f31d09a22d5886950cc1a6c009_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
947519f31d09a22d5886950cc1a6c009_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
947519f31d09a22d5886950cc1a6c009_cryptolocker_JC.exe
-
Size
74KB
-
MD5
947519f31d09a22d5886950cc1a6c009
-
SHA1
2fcb0b595788d733ea5e3d31dcf68288119d8351
-
SHA256
b8ec79d7bb9bf34710de01b866c87cd472a28ea13d5c94d05aa957e7208db41c
-
SHA512
3e363e6715f8ed4e6fdc1638f43d65183c3b82197fdc7a5bffb599753ba7af9d915d253f3d65a01120e4e297205ecec7ca26a9a24a9458d09282792871b62526
-
SSDEEP
768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLa5VccPtNw5CS95F:V6QFElP6n+gMQMOtEvwDpjyaLccVNlA
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4732 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3588 wrote to memory of 4732 3588 947519f31d09a22d5886950cc1a6c009_cryptolocker_JC.exe 81 PID 3588 wrote to memory of 4732 3588 947519f31d09a22d5886950cc1a6c009_cryptolocker_JC.exe 81 PID 3588 wrote to memory of 4732 3588 947519f31d09a22d5886950cc1a6c009_cryptolocker_JC.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\947519f31d09a22d5886950cc1a6c009_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\947519f31d09a22d5886950cc1a6c009_cryptolocker_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:4732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD5a2a316a530858679e882bff0439035a0
SHA11c25dc3b03f4967ecc424a0ec0dae888453e0c09
SHA256eb4a44f89b8fc02d79a4435ad8452042d85aa70e4d27ed9ddd45e5fb90e79d0f
SHA512bf911ff8a1024a7d33ced02ba20c82936e48e782ba2003701c9c0052d569f76fbc4becd8403e844a204e9faa25ae0f6f2892809ff813d96b5f19a03302d18aa6
-
Filesize
74KB
MD5a2a316a530858679e882bff0439035a0
SHA11c25dc3b03f4967ecc424a0ec0dae888453e0c09
SHA256eb4a44f89b8fc02d79a4435ad8452042d85aa70e4d27ed9ddd45e5fb90e79d0f
SHA512bf911ff8a1024a7d33ced02ba20c82936e48e782ba2003701c9c0052d569f76fbc4becd8403e844a204e9faa25ae0f6f2892809ff813d96b5f19a03302d18aa6
-
Filesize
74KB
MD5a2a316a530858679e882bff0439035a0
SHA11c25dc3b03f4967ecc424a0ec0dae888453e0c09
SHA256eb4a44f89b8fc02d79a4435ad8452042d85aa70e4d27ed9ddd45e5fb90e79d0f
SHA512bf911ff8a1024a7d33ced02ba20c82936e48e782ba2003701c9c0052d569f76fbc4becd8403e844a204e9faa25ae0f6f2892809ff813d96b5f19a03302d18aa6