Analysis

  • max time kernel
    134s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    08/08/2023, 18:22

General

  • Target

    a0d74157c94310e78c3c561fdf479719_cryptolocker_JC.exe

  • Size

    87KB

  • MD5

    a0d74157c94310e78c3c561fdf479719

  • SHA1

    d691d858d67413648fcfe28336b97469a97dc486

  • SHA256

    ffa6642e25f0690e4a8454c28955219d4de344264f3a686cd72ee3fc8476842e

  • SHA512

    e4d3a6c4a6b3756f949dbb80223905a60823bffaf9eb2e8a44fa12388267cc130fd83e8fe320149204d86c6c038638078fb5e4bb21071016c9d3f3938076a8d3

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDW9:zCsanOtEvwDpj5

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a0d74157c94310e78c3c561fdf479719_cryptolocker_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\a0d74157c94310e78c3c561fdf479719_cryptolocker_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2536
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    87KB

    MD5

    ea9eb54729f0f2e472421bf7807cedb1

    SHA1

    a859de58ed300a722b3d1cd437cc2423e1332652

    SHA256

    213333d7cc2a11aafdfb9f6ee965a63dcb65dae3525cf5f77e07af2d5bb65f61

    SHA512

    8173e456471a3c982cdfaa2d19a81e20de90b50f91e89ffe102ba14a88fa531cc6ddabaa6f3ad83d199f90b10646001e4d0f6d30c6cfaefa406f1d639e2c1fe5

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    87KB

    MD5

    ea9eb54729f0f2e472421bf7807cedb1

    SHA1

    a859de58ed300a722b3d1cd437cc2423e1332652

    SHA256

    213333d7cc2a11aafdfb9f6ee965a63dcb65dae3525cf5f77e07af2d5bb65f61

    SHA512

    8173e456471a3c982cdfaa2d19a81e20de90b50f91e89ffe102ba14a88fa531cc6ddabaa6f3ad83d199f90b10646001e4d0f6d30c6cfaefa406f1d639e2c1fe5

  • \Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    87KB

    MD5

    ea9eb54729f0f2e472421bf7807cedb1

    SHA1

    a859de58ed300a722b3d1cd437cc2423e1332652

    SHA256

    213333d7cc2a11aafdfb9f6ee965a63dcb65dae3525cf5f77e07af2d5bb65f61

    SHA512

    8173e456471a3c982cdfaa2d19a81e20de90b50f91e89ffe102ba14a88fa531cc6ddabaa6f3ad83d199f90b10646001e4d0f6d30c6cfaefa406f1d639e2c1fe5

  • memory/2536-56-0x0000000000320000-0x0000000000326000-memory.dmp

    Filesize

    24KB

  • memory/2536-53-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2536-68-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2536-55-0x0000000000450000-0x0000000000456000-memory.dmp

    Filesize

    24KB

  • memory/2536-69-0x0000000000680000-0x0000000000690000-memory.dmp

    Filesize

    64KB

  • memory/2536-54-0x0000000000320000-0x0000000000326000-memory.dmp

    Filesize

    24KB

  • memory/2536-80-0x0000000000680000-0x0000000000690000-memory.dmp

    Filesize

    64KB

  • memory/2884-70-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2884-72-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB

  • memory/2884-73-0x00000000003C0000-0x00000000003C6000-memory.dmp

    Filesize

    24KB

  • memory/2884-81-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB