Analysis
-
max time kernel
132s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
15/08/2023, 18:48
Static task
static1
Behavioral task
behavioral1
Sample
01ae7f76481ed554706c308f710ccef5_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
01ae7f76481ed554706c308f710ccef5_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
01ae7f76481ed554706c308f710ccef5_cryptolocker_JC.exe
-
Size
49KB
-
MD5
01ae7f76481ed554706c308f710ccef5
-
SHA1
c4dd316ca016ecc29e24f7564a2d5e25259e9897
-
SHA256
a61f1bdd5cc871394fc1b164bcbe2a2e17d5cf56027881bf1ea35d653b20e1b8
-
SHA512
e590bb2efde01de4c2f7e209f65487a8626da7acee5d9e9ed435521feb9905498c202694c30a26af89f963154cb4a47237000bfd0fa8b1f13079968998c835eb
-
SSDEEP
768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4hdCW1nw71TkhsiPn1YFvL:vj+jsMQMOtEvwDpj5HH1nw73KOFz
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2836 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2424 01ae7f76481ed554706c308f710ccef5_cryptolocker_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2424 wrote to memory of 2836 2424 01ae7f76481ed554706c308f710ccef5_cryptolocker_JC.exe 28 PID 2424 wrote to memory of 2836 2424 01ae7f76481ed554706c308f710ccef5_cryptolocker_JC.exe 28 PID 2424 wrote to memory of 2836 2424 01ae7f76481ed554706c308f710ccef5_cryptolocker_JC.exe 28 PID 2424 wrote to memory of 2836 2424 01ae7f76481ed554706c308f710ccef5_cryptolocker_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\01ae7f76481ed554706c308f710ccef5_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\01ae7f76481ed554706c308f710ccef5_cryptolocker_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD5906514f4ca78bd57cfa6182f50bc0a1e
SHA159beff2a8a7ce19427d8b4004e414ddeab00f106
SHA256f949065074a37c3b9b7398f9ec1d49c934b90250e52be6b466741b54bc0d2458
SHA512ad8f7ecf277e3068977f3d0920e7b3c1812dce9a7e2278909261d1cd3096b2017bb0df4bdb6c23bd25c7910d226580f89fc5b72505f80587e213fb061ac17097
-
Filesize
49KB
MD5906514f4ca78bd57cfa6182f50bc0a1e
SHA159beff2a8a7ce19427d8b4004e414ddeab00f106
SHA256f949065074a37c3b9b7398f9ec1d49c934b90250e52be6b466741b54bc0d2458
SHA512ad8f7ecf277e3068977f3d0920e7b3c1812dce9a7e2278909261d1cd3096b2017bb0df4bdb6c23bd25c7910d226580f89fc5b72505f80587e213fb061ac17097
-
Filesize
49KB
MD5906514f4ca78bd57cfa6182f50bc0a1e
SHA159beff2a8a7ce19427d8b4004e414ddeab00f106
SHA256f949065074a37c3b9b7398f9ec1d49c934b90250e52be6b466741b54bc0d2458
SHA512ad8f7ecf277e3068977f3d0920e7b3c1812dce9a7e2278909261d1cd3096b2017bb0df4bdb6c23bd25c7910d226580f89fc5b72505f80587e213fb061ac17097