Analysis

  • max time kernel
    130s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    15-08-2023 16:13

General

  • Target

    f6e8b374412dd0e32ec8d4e7aa4ac555_cryptolocker_JC.exe

  • Size

    27KB

  • MD5

    f6e8b374412dd0e32ec8d4e7aa4ac555

  • SHA1

    c02e770ab97050f5acec0b94e12c15c843c59e13

  • SHA256

    f6b94ad696e11960478db9db47d5a7be722be5b7ab4c26f503da7322edaa004a

  • SHA512

    0a5f26eb6d55945598815c66c15705f55b78ff5cfa64df46e257c2e7191c6e998eed47e11371779b7fd5b7e8527902ed66fa7755898575d9cb1fba28251ab7ea

  • SSDEEP

    384:bgX4uGLLQRcsdeQ7/nQu63Ag7YmecFanrlwfjDUkJbt:bgX4zYcgTEu6QOaryfjpZ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6e8b374412dd0e32ec8d4e7aa4ac555_cryptolocker_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\f6e8b374412dd0e32ec8d4e7aa4ac555_cryptolocker_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1636
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2412

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    27KB

    MD5

    c8dc4678a21a9319045a0b32426d5528

    SHA1

    a080bb888e016fb8cabee3b199612b0c9de0d92e

    SHA256

    b1d42a20ec4de908279f45abc6986f46d85f1619f9c6df09cbe41025f65b8354

    SHA512

    c6b84c2130e90091c4a6279393511a90ebb7e69f3a65d950a1d88ab8cf3b91287f82ffcb91e5772c739a1764620babcfd7d9c40caf4fe70cac7bf3cab0e05be6

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    27KB

    MD5

    c8dc4678a21a9319045a0b32426d5528

    SHA1

    a080bb888e016fb8cabee3b199612b0c9de0d92e

    SHA256

    b1d42a20ec4de908279f45abc6986f46d85f1619f9c6df09cbe41025f65b8354

    SHA512

    c6b84c2130e90091c4a6279393511a90ebb7e69f3a65d950a1d88ab8cf3b91287f82ffcb91e5772c739a1764620babcfd7d9c40caf4fe70cac7bf3cab0e05be6

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    27KB

    MD5

    c8dc4678a21a9319045a0b32426d5528

    SHA1

    a080bb888e016fb8cabee3b199612b0c9de0d92e

    SHA256

    b1d42a20ec4de908279f45abc6986f46d85f1619f9c6df09cbe41025f65b8354

    SHA512

    c6b84c2130e90091c4a6279393511a90ebb7e69f3a65d950a1d88ab8cf3b91287f82ffcb91e5772c739a1764620babcfd7d9c40caf4fe70cac7bf3cab0e05be6

  • memory/1636-54-0x0000000000200000-0x0000000000206000-memory.dmp

    Filesize

    24KB

  • memory/1636-56-0x00000000002A0000-0x00000000002A6000-memory.dmp

    Filesize

    24KB

  • memory/1636-55-0x0000000000200000-0x0000000000206000-memory.dmp

    Filesize

    24KB

  • memory/2412-70-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/2412-69-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB