Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
08-08-2023 16:32
Static task
static1
Behavioral task
behavioral1
Sample
99d3ab2bfa0f9ca5caa54a99dbc5d049_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
99d3ab2bfa0f9ca5caa54a99dbc5d049_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
99d3ab2bfa0f9ca5caa54a99dbc5d049_cryptolocker_JC.exe
-
Size
73KB
-
MD5
99d3ab2bfa0f9ca5caa54a99dbc5d049
-
SHA1
61a7b99b7b1c9504614f693aabfcc2df4e526052
-
SHA256
cbaf7f668a92544d85d9618efc025610ec4ec5fa752a9a65c90893c685e755e2
-
SHA512
458db7d0ea500b344ea8bbdc30ebc34d2f98a32323aa906f4382241910109ae5cf3b09f31f2c98a2d7d733017d1ec67c25acbef885fec1b679f5997185fc08da
-
SSDEEP
1536:ZzFbxmLPWQMOtEvwDpj386Sj/WprgJNpsAnJYqdIR+nD:ZVxkGOtEvwDpjcNB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2908 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 3024 99d3ab2bfa0f9ca5caa54a99dbc5d049_cryptolocker_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2908 3024 99d3ab2bfa0f9ca5caa54a99dbc5d049_cryptolocker_JC.exe 28 PID 3024 wrote to memory of 2908 3024 99d3ab2bfa0f9ca5caa54a99dbc5d049_cryptolocker_JC.exe 28 PID 3024 wrote to memory of 2908 3024 99d3ab2bfa0f9ca5caa54a99dbc5d049_cryptolocker_JC.exe 28 PID 3024 wrote to memory of 2908 3024 99d3ab2bfa0f9ca5caa54a99dbc5d049_cryptolocker_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\99d3ab2bfa0f9ca5caa54a99dbc5d049_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\99d3ab2bfa0f9ca5caa54a99dbc5d049_cryptolocker_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5981c002cb67d5aec36d8e8b5f9a07a72
SHA143d69a922649be0134599dd834f93ab53f98eb63
SHA256305930ff8fe3d7998805e977463baaa4986139c87037f7a27cd74d1afaf3d402
SHA512d8bf6da702672970df068e6154d4231ad8928aba37b458f22092491b064bd90e4a0c7714f63be788137d94a9d38383bec2ff6981b8096e33822aebe12bdad938
-
Filesize
73KB
MD5981c002cb67d5aec36d8e8b5f9a07a72
SHA143d69a922649be0134599dd834f93ab53f98eb63
SHA256305930ff8fe3d7998805e977463baaa4986139c87037f7a27cd74d1afaf3d402
SHA512d8bf6da702672970df068e6154d4231ad8928aba37b458f22092491b064bd90e4a0c7714f63be788137d94a9d38383bec2ff6981b8096e33822aebe12bdad938
-
Filesize
73KB
MD5981c002cb67d5aec36d8e8b5f9a07a72
SHA143d69a922649be0134599dd834f93ab53f98eb63
SHA256305930ff8fe3d7998805e977463baaa4986139c87037f7a27cd74d1afaf3d402
SHA512d8bf6da702672970df068e6154d4231ad8928aba37b458f22092491b064bd90e4a0c7714f63be788137d94a9d38383bec2ff6981b8096e33822aebe12bdad938