Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08-08-2023 17:22
Static task
static1
Behavioral task
behavioral1
Sample
9ca8ea35b691ee9478a9a831c48c5f20_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
9ca8ea35b691ee9478a9a831c48c5f20_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
9ca8ea35b691ee9478a9a831c48c5f20_cryptolocker_JC.exe
-
Size
55KB
-
MD5
9ca8ea35b691ee9478a9a831c48c5f20
-
SHA1
dc5ca0d3bc54ac4729ef129f9a1d2821c5f14195
-
SHA256
38b45baacd4792500bbcfc23426d5a27a89aea3ef903918e21459b19554010f8
-
SHA512
c9e6b5465bf541a05a6e3c9e6587261c78ea10476361b7800dd28b67acfcc57aee11d4dc7960f3daba71dd44bc0ed97bdf018d983559575fb445cc85707eebfb
-
SSDEEP
1536:X6QFElP6n+gJQMOtEvwDpjBccD2RuoNmuBLZW:X6a+SOtEvwDpjBrOm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4912 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1796 wrote to memory of 4912 1796 9ca8ea35b691ee9478a9a831c48c5f20_cryptolocker_JC.exe 83 PID 1796 wrote to memory of 4912 1796 9ca8ea35b691ee9478a9a831c48c5f20_cryptolocker_JC.exe 83 PID 1796 wrote to memory of 4912 1796 9ca8ea35b691ee9478a9a831c48c5f20_cryptolocker_JC.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ca8ea35b691ee9478a9a831c48c5f20_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\9ca8ea35b691ee9478a9a831c48c5f20_cryptolocker_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:4912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD51f2515f1f0393a00bea8cf554e5c157e
SHA151ddc993582422a7fea862f1e558de4a286aeaff
SHA2563b3a9a966859e3b72a9144381e830acc209bc9df3d1a70889dac6f2e3fe7b824
SHA51228cbe21248f4794c6cf97c6ce51ea77691b41596ded48b3ebdfbb9e9699c0fc1045b8261860f6918cf08c2b235ca79c7673f7734af551dfe59f88bbef528a548
-
Filesize
55KB
MD51f2515f1f0393a00bea8cf554e5c157e
SHA151ddc993582422a7fea862f1e558de4a286aeaff
SHA2563b3a9a966859e3b72a9144381e830acc209bc9df3d1a70889dac6f2e3fe7b824
SHA51228cbe21248f4794c6cf97c6ce51ea77691b41596ded48b3ebdfbb9e9699c0fc1045b8261860f6918cf08c2b235ca79c7673f7734af551dfe59f88bbef528a548
-
Filesize
55KB
MD51f2515f1f0393a00bea8cf554e5c157e
SHA151ddc993582422a7fea862f1e558de4a286aeaff
SHA2563b3a9a966859e3b72a9144381e830acc209bc9df3d1a70889dac6f2e3fe7b824
SHA51228cbe21248f4794c6cf97c6ce51ea77691b41596ded48b3ebdfbb9e9699c0fc1045b8261860f6918cf08c2b235ca79c7673f7734af551dfe59f88bbef528a548