Analysis

  • max time kernel
    138s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/08/2023, 14:55

General

  • Target

    947519f31d09a22d5886950cc1a6c009_cryptolocker_JC.exe

  • Size

    74KB

  • MD5

    947519f31d09a22d5886950cc1a6c009

  • SHA1

    2fcb0b595788d733ea5e3d31dcf68288119d8351

  • SHA256

    b8ec79d7bb9bf34710de01b866c87cd472a28ea13d5c94d05aa957e7208db41c

  • SHA512

    3e363e6715f8ed4e6fdc1638f43d65183c3b82197fdc7a5bffb599753ba7af9d915d253f3d65a01120e4e297205ecec7ca26a9a24a9458d09282792871b62526

  • SSDEEP

    768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLa5VccPtNw5CS95F:V6QFElP6n+gMQMOtEvwDpjyaLccVNlA

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\947519f31d09a22d5886950cc1a6c009_cryptolocker_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\947519f31d09a22d5886950cc1a6c009_cryptolocker_JC.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3588
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:4732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    74KB

    MD5

    a2a316a530858679e882bff0439035a0

    SHA1

    1c25dc3b03f4967ecc424a0ec0dae888453e0c09

    SHA256

    eb4a44f89b8fc02d79a4435ad8452042d85aa70e4d27ed9ddd45e5fb90e79d0f

    SHA512

    bf911ff8a1024a7d33ced02ba20c82936e48e782ba2003701c9c0052d569f76fbc4becd8403e844a204e9faa25ae0f6f2892809ff813d96b5f19a03302d18aa6

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    74KB

    MD5

    a2a316a530858679e882bff0439035a0

    SHA1

    1c25dc3b03f4967ecc424a0ec0dae888453e0c09

    SHA256

    eb4a44f89b8fc02d79a4435ad8452042d85aa70e4d27ed9ddd45e5fb90e79d0f

    SHA512

    bf911ff8a1024a7d33ced02ba20c82936e48e782ba2003701c9c0052d569f76fbc4becd8403e844a204e9faa25ae0f6f2892809ff813d96b5f19a03302d18aa6

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    74KB

    MD5

    a2a316a530858679e882bff0439035a0

    SHA1

    1c25dc3b03f4967ecc424a0ec0dae888453e0c09

    SHA256

    eb4a44f89b8fc02d79a4435ad8452042d85aa70e4d27ed9ddd45e5fb90e79d0f

    SHA512

    bf911ff8a1024a7d33ced02ba20c82936e48e782ba2003701c9c0052d569f76fbc4becd8403e844a204e9faa25ae0f6f2892809ff813d96b5f19a03302d18aa6

  • memory/3588-133-0x0000000000670000-0x0000000000676000-memory.dmp

    Filesize

    24KB

  • memory/3588-134-0x0000000000670000-0x0000000000676000-memory.dmp

    Filesize

    24KB

  • memory/3588-135-0x0000000002100000-0x0000000002106000-memory.dmp

    Filesize

    24KB

  • memory/4732-151-0x0000000000750000-0x0000000000756000-memory.dmp

    Filesize

    24KB

  • memory/4732-150-0x0000000000620000-0x0000000000626000-memory.dmp

    Filesize

    24KB