Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/08/2023, 17:41

General

  • Target

    9e1e37be6c7d3e305768553d72190e06_cryptolocker_JC.exe

  • Size

    32KB

  • MD5

    9e1e37be6c7d3e305768553d72190e06

  • SHA1

    35f350e88643560ea3b2f5daca2955180601c423

  • SHA256

    86bbebc5f4d46f03bc0091dd3989b5692e33864fe63656d3187f3ab425554de9

  • SHA512

    2c60f40e18defa45541b71f12ba2f61a3e4e2685bec1fe167d2c9ae5c3d20ce9c79da0fb0bcad0a94bc857ae2e548555a441f2c2a1ab86c58387d6cc6cfefb3d

  • SSDEEP

    384:bgX4uGLLQRcsdeQ7/nQu63Ag7YmecFanrlwfjDUkKDfWf0w3Yxp4Q:bgX4zYcgTEu6QOaryfjqDDw30L

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e1e37be6c7d3e305768553d72190e06_cryptolocker_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\9e1e37be6c7d3e305768553d72190e06_cryptolocker_JC.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2468
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2356

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    32KB

    MD5

    bf171408accfac01ce0470d6bc6b118c

    SHA1

    1082a631a124241006252df7272670c0885c6e54

    SHA256

    70093b54e417862d388089c8f679beee1c3ad2868f22e317d2615ad352503ff0

    SHA512

    6c1b702cba8bc427c4f6f4d7d5c0aaed28b07075627d9948854124afbfd89a78f7c4ddc14a5fa043ae99df7392bce9e6e9c7773a3698f38db2040769440dfacf

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    32KB

    MD5

    bf171408accfac01ce0470d6bc6b118c

    SHA1

    1082a631a124241006252df7272670c0885c6e54

    SHA256

    70093b54e417862d388089c8f679beee1c3ad2868f22e317d2615ad352503ff0

    SHA512

    6c1b702cba8bc427c4f6f4d7d5c0aaed28b07075627d9948854124afbfd89a78f7c4ddc14a5fa043ae99df7392bce9e6e9c7773a3698f38db2040769440dfacf

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    32KB

    MD5

    bf171408accfac01ce0470d6bc6b118c

    SHA1

    1082a631a124241006252df7272670c0885c6e54

    SHA256

    70093b54e417862d388089c8f679beee1c3ad2868f22e317d2615ad352503ff0

    SHA512

    6c1b702cba8bc427c4f6f4d7d5c0aaed28b07075627d9948854124afbfd89a78f7c4ddc14a5fa043ae99df7392bce9e6e9c7773a3698f38db2040769440dfacf

  • memory/2356-150-0x0000000002ED0000-0x0000000002ED6000-memory.dmp

    Filesize

    24KB

  • memory/2356-151-0x0000000002D60000-0x0000000002D66000-memory.dmp

    Filesize

    24KB

  • memory/2468-133-0x0000000002250000-0x0000000002256000-memory.dmp

    Filesize

    24KB

  • memory/2468-134-0x0000000002250000-0x0000000002256000-memory.dmp

    Filesize

    24KB

  • memory/2468-135-0x0000000002400000-0x0000000002406000-memory.dmp

    Filesize

    24KB