Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    08/08/2023, 17:22

General

  • Target

    9ca8ea35b691ee9478a9a831c48c5f20_cryptolocker_JC.exe

  • Size

    55KB

  • MD5

    9ca8ea35b691ee9478a9a831c48c5f20

  • SHA1

    dc5ca0d3bc54ac4729ef129f9a1d2821c5f14195

  • SHA256

    38b45baacd4792500bbcfc23426d5a27a89aea3ef903918e21459b19554010f8

  • SHA512

    c9e6b5465bf541a05a6e3c9e6587261c78ea10476361b7800dd28b67acfcc57aee11d4dc7960f3daba71dd44bc0ed97bdf018d983559575fb445cc85707eebfb

  • SSDEEP

    1536:X6QFElP6n+gJQMOtEvwDpjBccD2RuoNmuBLZW:X6a+SOtEvwDpjBrOm

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9ca8ea35b691ee9478a9a831c48c5f20_cryptolocker_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\9ca8ea35b691ee9478a9a831c48c5f20_cryptolocker_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2088
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1800

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          55KB

          MD5

          1f2515f1f0393a00bea8cf554e5c157e

          SHA1

          51ddc993582422a7fea862f1e558de4a286aeaff

          SHA256

          3b3a9a966859e3b72a9144381e830acc209bc9df3d1a70889dac6f2e3fe7b824

          SHA512

          28cbe21248f4794c6cf97c6ce51ea77691b41596ded48b3ebdfbb9e9699c0fc1045b8261860f6918cf08c2b235ca79c7673f7734af551dfe59f88bbef528a548

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          55KB

          MD5

          1f2515f1f0393a00bea8cf554e5c157e

          SHA1

          51ddc993582422a7fea862f1e558de4a286aeaff

          SHA256

          3b3a9a966859e3b72a9144381e830acc209bc9df3d1a70889dac6f2e3fe7b824

          SHA512

          28cbe21248f4794c6cf97c6ce51ea77691b41596ded48b3ebdfbb9e9699c0fc1045b8261860f6918cf08c2b235ca79c7673f7734af551dfe59f88bbef528a548

        • \Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          55KB

          MD5

          1f2515f1f0393a00bea8cf554e5c157e

          SHA1

          51ddc993582422a7fea862f1e558de4a286aeaff

          SHA256

          3b3a9a966859e3b72a9144381e830acc209bc9df3d1a70889dac6f2e3fe7b824

          SHA512

          28cbe21248f4794c6cf97c6ce51ea77691b41596ded48b3ebdfbb9e9699c0fc1045b8261860f6918cf08c2b235ca79c7673f7734af551dfe59f88bbef528a548

        • memory/1800-70-0x00000000004D0000-0x00000000004D6000-memory.dmp

          Filesize

          24KB

        • memory/1800-69-0x0000000000250000-0x0000000000256000-memory.dmp

          Filesize

          24KB

        • memory/2088-54-0x00000000001D0000-0x00000000001D6000-memory.dmp

          Filesize

          24KB

        • memory/2088-55-0x0000000000200000-0x0000000000206000-memory.dmp

          Filesize

          24KB

        • memory/2088-57-0x00000000001D0000-0x00000000001D6000-memory.dmp

          Filesize

          24KB