Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08/08/2023, 17:41
Static task
static1
Behavioral task
behavioral1
Sample
9e1e37be6c7d3e305768553d72190e06_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
9e1e37be6c7d3e305768553d72190e06_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
9e1e37be6c7d3e305768553d72190e06_cryptolocker_JC.exe
-
Size
32KB
-
MD5
9e1e37be6c7d3e305768553d72190e06
-
SHA1
35f350e88643560ea3b2f5daca2955180601c423
-
SHA256
86bbebc5f4d46f03bc0091dd3989b5692e33864fe63656d3187f3ab425554de9
-
SHA512
2c60f40e18defa45541b71f12ba2f61a3e4e2685bec1fe167d2c9ae5c3d20ce9c79da0fb0bcad0a94bc857ae2e548555a441f2c2a1ab86c58387d6cc6cfefb3d
-
SSDEEP
384:bgX4uGLLQRcsdeQ7/nQu63Ag7YmecFanrlwfjDUkKDfWf0w3Yxp4Q:bgX4zYcgTEu6QOaryfjqDDw30L
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2356 hasfj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2356 2468 9e1e37be6c7d3e305768553d72190e06_cryptolocker_JC.exe 81 PID 2468 wrote to memory of 2356 2468 9e1e37be6c7d3e305768553d72190e06_cryptolocker_JC.exe 81 PID 2468 wrote to memory of 2356 2468 9e1e37be6c7d3e305768553d72190e06_cryptolocker_JC.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e1e37be6c7d3e305768553d72190e06_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\9e1e37be6c7d3e305768553d72190e06_cryptolocker_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5bf171408accfac01ce0470d6bc6b118c
SHA11082a631a124241006252df7272670c0885c6e54
SHA25670093b54e417862d388089c8f679beee1c3ad2868f22e317d2615ad352503ff0
SHA5126c1b702cba8bc427c4f6f4d7d5c0aaed28b07075627d9948854124afbfd89a78f7c4ddc14a5fa043ae99df7392bce9e6e9c7773a3698f38db2040769440dfacf
-
Filesize
32KB
MD5bf171408accfac01ce0470d6bc6b118c
SHA11082a631a124241006252df7272670c0885c6e54
SHA25670093b54e417862d388089c8f679beee1c3ad2868f22e317d2615ad352503ff0
SHA5126c1b702cba8bc427c4f6f4d7d5c0aaed28b07075627d9948854124afbfd89a78f7c4ddc14a5fa043ae99df7392bce9e6e9c7773a3698f38db2040769440dfacf
-
Filesize
32KB
MD5bf171408accfac01ce0470d6bc6b118c
SHA11082a631a124241006252df7272670c0885c6e54
SHA25670093b54e417862d388089c8f679beee1c3ad2868f22e317d2615ad352503ff0
SHA5126c1b702cba8bc427c4f6f4d7d5c0aaed28b07075627d9948854124afbfd89a78f7c4ddc14a5fa043ae99df7392bce9e6e9c7773a3698f38db2040769440dfacf