Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
18/08/2023, 14:13
Behavioral task
behavioral1
Sample
2a216f01191d16ee4eca6b7d34c0daab_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
2a216f01191d16ee4eca6b7d34c0daab_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
2a216f01191d16ee4eca6b7d34c0daab_cryptolocker_JC.exe
-
Size
62KB
-
MD5
2a216f01191d16ee4eca6b7d34c0daab
-
SHA1
f1a0bf8a27e2d3b19282410ad27db7b295216808
-
SHA256
1ab2b0159da300d44b976761d1659f8657341d9316601a49004d143325a39326
-
SHA512
5ac031e24d7d8ff22fce39f585ade0b72b1c41652dc25816704ae3f715aa09affc50f6d08dba4680edf9a4057d311d580e23aceaa7bb7b18691e62acb2d9d927
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYXUXojZv:1nK6a+qdOOtEvwDpjU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2584 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2328 2a216f01191d16ee4eca6b7d34c0daab_cryptolocker_JC.exe -
resource yara_rule behavioral1/memory/2328-54-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral1/memory/2328-69-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral1/memory/2584-71-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral1/files/0x000d00000001201c-70.dat upx behavioral1/files/0x000d00000001201c-65.dat upx behavioral1/files/0x000d00000001201c-80.dat upx behavioral1/memory/2584-82-0x0000000000500000-0x000000000050F311-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2584 2328 2a216f01191d16ee4eca6b7d34c0daab_cryptolocker_JC.exe 28 PID 2328 wrote to memory of 2584 2328 2a216f01191d16ee4eca6b7d34c0daab_cryptolocker_JC.exe 28 PID 2328 wrote to memory of 2584 2328 2a216f01191d16ee4eca6b7d34c0daab_cryptolocker_JC.exe 28 PID 2328 wrote to memory of 2584 2328 2a216f01191d16ee4eca6b7d34c0daab_cryptolocker_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a216f01191d16ee4eca6b7d34c0daab_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\2a216f01191d16ee4eca6b7d34c0daab_cryptolocker_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD53242a1e8d11b5fa1b7b6c49175ca4d51
SHA16352664745db784d92233b576cd4fa3b005bf4c5
SHA256b34de6736f2de573f785faf4b6077b9540c19765f218e0e30b8e332cc0b164a7
SHA5126dea95ec57fdbb4e45d637e4ceaef72706e420f0596cc0f0e3a3b9569b429339305a2b47636db4d85401f08acac87652d7eab96054fc24c3a373ab93e3da009e
-
Filesize
62KB
MD53242a1e8d11b5fa1b7b6c49175ca4d51
SHA16352664745db784d92233b576cd4fa3b005bf4c5
SHA256b34de6736f2de573f785faf4b6077b9540c19765f218e0e30b8e332cc0b164a7
SHA5126dea95ec57fdbb4e45d637e4ceaef72706e420f0596cc0f0e3a3b9569b429339305a2b47636db4d85401f08acac87652d7eab96054fc24c3a373ab93e3da009e
-
Filesize
62KB
MD53242a1e8d11b5fa1b7b6c49175ca4d51
SHA16352664745db784d92233b576cd4fa3b005bf4c5
SHA256b34de6736f2de573f785faf4b6077b9540c19765f218e0e30b8e332cc0b164a7
SHA5126dea95ec57fdbb4e45d637e4ceaef72706e420f0596cc0f0e3a3b9569b429339305a2b47636db4d85401f08acac87652d7eab96054fc24c3a373ab93e3da009e