Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-08-2023 16:43

General

  • Target

    070c679096dd60cc64ecb98eb5bc0a45_cryptolocker_JC.exe

  • Size

    36KB

  • MD5

    070c679096dd60cc64ecb98eb5bc0a45

  • SHA1

    178a5718e818ad7d390b4a51019a144eeab455ce

  • SHA256

    e9818ddeddc1a5437a20c90f1cb362754522e2727219564acd217ad051c8a17e

  • SHA512

    e3194ec149873ed3043a6bf794c7bd3d8f826767317eb57e375dc33d7e7de288704c4cbb0c359b2ff854ae94dcb42ddf2db95c76f88b1cc565f683630233d8c1

  • SSDEEP

    384:bmM0V/YPvnr801TRoUGPh4TKt6ATt1DqgPa3s/zzorwI62gqNTXWd1Sad1ylc7b+:b7o/2n1TCraU6GD1a4Xcn62TUdcuQlqK

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\070c679096dd60cc64ecb98eb5bc0a45_cryptolocker_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\070c679096dd60cc64ecb98eb5bc0a45_cryptolocker_JC.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3828
    • C:\Users\Admin\AppData\Local\Temp\rewok.exe
      "C:\Users\Admin\AppData\Local\Temp\rewok.exe"
      2⤵
      • Executes dropped EXE
      PID:1632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rewok.exe

    Filesize

    36KB

    MD5

    fb86d8c650179709ee0dfd94e6c8a855

    SHA1

    88f49d13c0b7225101566a45bb258166ace1136b

    SHA256

    c9297b5a632f09b57856f2d5631ddd8fa0ec4716cad7439dd2081330f918bf43

    SHA512

    96e117a72dbfd78d0ee93583e8113111273cb77e2b655ac9dd334fba82767c72cbed9617e6ac38c3054acb50fbc8d1605fd2af2d539f36f6b5b14ff3a4bad715

  • C:\Users\Admin\AppData\Local\Temp\rewok.exe

    Filesize

    36KB

    MD5

    fb86d8c650179709ee0dfd94e6c8a855

    SHA1

    88f49d13c0b7225101566a45bb258166ace1136b

    SHA256

    c9297b5a632f09b57856f2d5631ddd8fa0ec4716cad7439dd2081330f918bf43

    SHA512

    96e117a72dbfd78d0ee93583e8113111273cb77e2b655ac9dd334fba82767c72cbed9617e6ac38c3054acb50fbc8d1605fd2af2d539f36f6b5b14ff3a4bad715

  • C:\Users\Admin\AppData\Local\Temp\rewok.exe

    Filesize

    36KB

    MD5

    fb86d8c650179709ee0dfd94e6c8a855

    SHA1

    88f49d13c0b7225101566a45bb258166ace1136b

    SHA256

    c9297b5a632f09b57856f2d5631ddd8fa0ec4716cad7439dd2081330f918bf43

    SHA512

    96e117a72dbfd78d0ee93583e8113111273cb77e2b655ac9dd334fba82767c72cbed9617e6ac38c3054acb50fbc8d1605fd2af2d539f36f6b5b14ff3a4bad715

  • memory/1632-153-0x0000000002070000-0x0000000002076000-memory.dmp

    Filesize

    24KB

  • memory/3828-133-0x0000000002250000-0x0000000002256000-memory.dmp

    Filesize

    24KB

  • memory/3828-134-0x0000000002250000-0x0000000002256000-memory.dmp

    Filesize

    24KB

  • memory/3828-135-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB