Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2023, 14:13

General

  • Target

    2a216f01191d16ee4eca6b7d34c0daab_cryptolocker_JC.exe

  • Size

    62KB

  • MD5

    2a216f01191d16ee4eca6b7d34c0daab

  • SHA1

    f1a0bf8a27e2d3b19282410ad27db7b295216808

  • SHA256

    1ab2b0159da300d44b976761d1659f8657341d9316601a49004d143325a39326

  • SHA512

    5ac031e24d7d8ff22fce39f585ade0b72b1c41652dc25816704ae3f715aa09affc50f6d08dba4680edf9a4057d311d580e23aceaa7bb7b18691e62acb2d9d927

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYXUXojZv:1nK6a+qdOOtEvwDpjU

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a216f01191d16ee4eca6b7d34c0daab_cryptolocker_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\2a216f01191d16ee4eca6b7d34c0daab_cryptolocker_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2328
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    62KB

    MD5

    3242a1e8d11b5fa1b7b6c49175ca4d51

    SHA1

    6352664745db784d92233b576cd4fa3b005bf4c5

    SHA256

    b34de6736f2de573f785faf4b6077b9540c19765f218e0e30b8e332cc0b164a7

    SHA512

    6dea95ec57fdbb4e45d637e4ceaef72706e420f0596cc0f0e3a3b9569b429339305a2b47636db4d85401f08acac87652d7eab96054fc24c3a373ab93e3da009e

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    62KB

    MD5

    3242a1e8d11b5fa1b7b6c49175ca4d51

    SHA1

    6352664745db784d92233b576cd4fa3b005bf4c5

    SHA256

    b34de6736f2de573f785faf4b6077b9540c19765f218e0e30b8e332cc0b164a7

    SHA512

    6dea95ec57fdbb4e45d637e4ceaef72706e420f0596cc0f0e3a3b9569b429339305a2b47636db4d85401f08acac87652d7eab96054fc24c3a373ab93e3da009e

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    62KB

    MD5

    3242a1e8d11b5fa1b7b6c49175ca4d51

    SHA1

    6352664745db784d92233b576cd4fa3b005bf4c5

    SHA256

    b34de6736f2de573f785faf4b6077b9540c19765f218e0e30b8e332cc0b164a7

    SHA512

    6dea95ec57fdbb4e45d637e4ceaef72706e420f0596cc0f0e3a3b9569b429339305a2b47636db4d85401f08acac87652d7eab96054fc24c3a373ab93e3da009e

  • memory/2328-60-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2328-69-0x0000000000500000-0x000000000050F311-memory.dmp

    Filesize

    60KB

  • memory/2328-54-0x0000000000500000-0x000000000050F311-memory.dmp

    Filesize

    60KB

  • memory/2328-68-0x0000000002480000-0x0000000002490000-memory.dmp

    Filesize

    64KB

  • memory/2328-56-0x0000000000270000-0x0000000000276000-memory.dmp

    Filesize

    24KB

  • memory/2328-55-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2328-81-0x0000000002480000-0x0000000002490000-memory.dmp

    Filesize

    64KB

  • memory/2584-71-0x0000000000500000-0x000000000050F311-memory.dmp

    Filesize

    60KB

  • memory/2584-74-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2584-73-0x0000000000200000-0x0000000000206000-memory.dmp

    Filesize

    24KB

  • memory/2584-82-0x0000000000500000-0x000000000050F311-memory.dmp

    Filesize

    60KB