Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-08-2023 17:22

General

  • Target

    9ca8ea35b691ee9478a9a831c48c5f20_cryptolocker_JC.exe

  • Size

    55KB

  • MD5

    9ca8ea35b691ee9478a9a831c48c5f20

  • SHA1

    dc5ca0d3bc54ac4729ef129f9a1d2821c5f14195

  • SHA256

    38b45baacd4792500bbcfc23426d5a27a89aea3ef903918e21459b19554010f8

  • SHA512

    c9e6b5465bf541a05a6e3c9e6587261c78ea10476361b7800dd28b67acfcc57aee11d4dc7960f3daba71dd44bc0ed97bdf018d983559575fb445cc85707eebfb

  • SSDEEP

    1536:X6QFElP6n+gJQMOtEvwDpjBccD2RuoNmuBLZW:X6a+SOtEvwDpjBrOm

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9ca8ea35b691ee9478a9a831c48c5f20_cryptolocker_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\9ca8ea35b691ee9478a9a831c48c5f20_cryptolocker_JC.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1796
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:4912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    55KB

    MD5

    1f2515f1f0393a00bea8cf554e5c157e

    SHA1

    51ddc993582422a7fea862f1e558de4a286aeaff

    SHA256

    3b3a9a966859e3b72a9144381e830acc209bc9df3d1a70889dac6f2e3fe7b824

    SHA512

    28cbe21248f4794c6cf97c6ce51ea77691b41596ded48b3ebdfbb9e9699c0fc1045b8261860f6918cf08c2b235ca79c7673f7734af551dfe59f88bbef528a548

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    55KB

    MD5

    1f2515f1f0393a00bea8cf554e5c157e

    SHA1

    51ddc993582422a7fea862f1e558de4a286aeaff

    SHA256

    3b3a9a966859e3b72a9144381e830acc209bc9df3d1a70889dac6f2e3fe7b824

    SHA512

    28cbe21248f4794c6cf97c6ce51ea77691b41596ded48b3ebdfbb9e9699c0fc1045b8261860f6918cf08c2b235ca79c7673f7734af551dfe59f88bbef528a548

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    55KB

    MD5

    1f2515f1f0393a00bea8cf554e5c157e

    SHA1

    51ddc993582422a7fea862f1e558de4a286aeaff

    SHA256

    3b3a9a966859e3b72a9144381e830acc209bc9df3d1a70889dac6f2e3fe7b824

    SHA512

    28cbe21248f4794c6cf97c6ce51ea77691b41596ded48b3ebdfbb9e9699c0fc1045b8261860f6918cf08c2b235ca79c7673f7734af551dfe59f88bbef528a548

  • memory/1796-133-0x00000000020D0000-0x00000000020D6000-memory.dmp

    Filesize

    24KB

  • memory/1796-134-0x00000000020D0000-0x00000000020D6000-memory.dmp

    Filesize

    24KB

  • memory/1796-135-0x0000000002100000-0x0000000002106000-memory.dmp

    Filesize

    24KB

  • memory/4912-152-0x00000000006B0000-0x00000000006B6000-memory.dmp

    Filesize

    24KB

  • memory/4912-150-0x00000000006D0000-0x00000000006D6000-memory.dmp

    Filesize

    24KB