Analysis
-
max time kernel
130s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
15-08-2023 16:13
Static task
static1
Behavioral task
behavioral1
Sample
f6e8b374412dd0e32ec8d4e7aa4ac555_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
f6e8b374412dd0e32ec8d4e7aa4ac555_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
f6e8b374412dd0e32ec8d4e7aa4ac555_cryptolocker_JC.exe
-
Size
27KB
-
MD5
f6e8b374412dd0e32ec8d4e7aa4ac555
-
SHA1
c02e770ab97050f5acec0b94e12c15c843c59e13
-
SHA256
f6b94ad696e11960478db9db47d5a7be722be5b7ab4c26f503da7322edaa004a
-
SHA512
0a5f26eb6d55945598815c66c15705f55b78ff5cfa64df46e257c2e7191c6e998eed47e11371779b7fd5b7e8527902ed66fa7755898575d9cb1fba28251ab7ea
-
SSDEEP
384:bgX4uGLLQRcsdeQ7/nQu63Ag7YmecFanrlwfjDUkJbt:bgX4zYcgTEu6QOaryfjpZ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2412 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 1636 f6e8b374412dd0e32ec8d4e7aa4ac555_cryptolocker_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1636 wrote to memory of 2412 1636 f6e8b374412dd0e32ec8d4e7aa4ac555_cryptolocker_JC.exe 28 PID 1636 wrote to memory of 2412 1636 f6e8b374412dd0e32ec8d4e7aa4ac555_cryptolocker_JC.exe 28 PID 1636 wrote to memory of 2412 1636 f6e8b374412dd0e32ec8d4e7aa4ac555_cryptolocker_JC.exe 28 PID 1636 wrote to memory of 2412 1636 f6e8b374412dd0e32ec8d4e7aa4ac555_cryptolocker_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6e8b374412dd0e32ec8d4e7aa4ac555_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\f6e8b374412dd0e32ec8d4e7aa4ac555_cryptolocker_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD5c8dc4678a21a9319045a0b32426d5528
SHA1a080bb888e016fb8cabee3b199612b0c9de0d92e
SHA256b1d42a20ec4de908279f45abc6986f46d85f1619f9c6df09cbe41025f65b8354
SHA512c6b84c2130e90091c4a6279393511a90ebb7e69f3a65d950a1d88ab8cf3b91287f82ffcb91e5772c739a1764620babcfd7d9c40caf4fe70cac7bf3cab0e05be6
-
Filesize
27KB
MD5c8dc4678a21a9319045a0b32426d5528
SHA1a080bb888e016fb8cabee3b199612b0c9de0d92e
SHA256b1d42a20ec4de908279f45abc6986f46d85f1619f9c6df09cbe41025f65b8354
SHA512c6b84c2130e90091c4a6279393511a90ebb7e69f3a65d950a1d88ab8cf3b91287f82ffcb91e5772c739a1764620babcfd7d9c40caf4fe70cac7bf3cab0e05be6
-
Filesize
27KB
MD5c8dc4678a21a9319045a0b32426d5528
SHA1a080bb888e016fb8cabee3b199612b0c9de0d92e
SHA256b1d42a20ec4de908279f45abc6986f46d85f1619f9c6df09cbe41025f65b8354
SHA512c6b84c2130e90091c4a6279393511a90ebb7e69f3a65d950a1d88ab8cf3b91287f82ffcb91e5772c739a1764620babcfd7d9c40caf4fe70cac7bf3cab0e05be6