Analysis

  • max time kernel
    148s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-08-2023 16:13

General

  • Target

    f6e8b374412dd0e32ec8d4e7aa4ac555_cryptolocker_JC.exe

  • Size

    27KB

  • MD5

    f6e8b374412dd0e32ec8d4e7aa4ac555

  • SHA1

    c02e770ab97050f5acec0b94e12c15c843c59e13

  • SHA256

    f6b94ad696e11960478db9db47d5a7be722be5b7ab4c26f503da7322edaa004a

  • SHA512

    0a5f26eb6d55945598815c66c15705f55b78ff5cfa64df46e257c2e7191c6e998eed47e11371779b7fd5b7e8527902ed66fa7755898575d9cb1fba28251ab7ea

  • SSDEEP

    384:bgX4uGLLQRcsdeQ7/nQu63Ag7YmecFanrlwfjDUkJbt:bgX4zYcgTEu6QOaryfjpZ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6e8b374412dd0e32ec8d4e7aa4ac555_cryptolocker_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\f6e8b374412dd0e32ec8d4e7aa4ac555_cryptolocker_JC.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5008
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:1752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    27KB

    MD5

    c8dc4678a21a9319045a0b32426d5528

    SHA1

    a080bb888e016fb8cabee3b199612b0c9de0d92e

    SHA256

    b1d42a20ec4de908279f45abc6986f46d85f1619f9c6df09cbe41025f65b8354

    SHA512

    c6b84c2130e90091c4a6279393511a90ebb7e69f3a65d950a1d88ab8cf3b91287f82ffcb91e5772c739a1764620babcfd7d9c40caf4fe70cac7bf3cab0e05be6

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    27KB

    MD5

    c8dc4678a21a9319045a0b32426d5528

    SHA1

    a080bb888e016fb8cabee3b199612b0c9de0d92e

    SHA256

    b1d42a20ec4de908279f45abc6986f46d85f1619f9c6df09cbe41025f65b8354

    SHA512

    c6b84c2130e90091c4a6279393511a90ebb7e69f3a65d950a1d88ab8cf3b91287f82ffcb91e5772c739a1764620babcfd7d9c40caf4fe70cac7bf3cab0e05be6

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    27KB

    MD5

    c8dc4678a21a9319045a0b32426d5528

    SHA1

    a080bb888e016fb8cabee3b199612b0c9de0d92e

    SHA256

    b1d42a20ec4de908279f45abc6986f46d85f1619f9c6df09cbe41025f65b8354

    SHA512

    c6b84c2130e90091c4a6279393511a90ebb7e69f3a65d950a1d88ab8cf3b91287f82ffcb91e5772c739a1764620babcfd7d9c40caf4fe70cac7bf3cab0e05be6

  • memory/1752-151-0x00000000006F0000-0x00000000006F6000-memory.dmp

    Filesize

    24KB

  • memory/1752-150-0x0000000002190000-0x0000000002196000-memory.dmp

    Filesize

    24KB

  • memory/5008-133-0x0000000002190000-0x0000000002196000-memory.dmp

    Filesize

    24KB

  • memory/5008-134-0x0000000002190000-0x0000000002196000-memory.dmp

    Filesize

    24KB

  • memory/5008-135-0x0000000003150000-0x0000000003156000-memory.dmp

    Filesize

    24KB