Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-08-2023 14:49

General

  • Target

    45a7e407be2cfbbaeca7693e867fc544_cryptolocker_JC.exe

  • Size

    28KB

  • MD5

    45a7e407be2cfbbaeca7693e867fc544

  • SHA1

    5ac6fd29d7a64d44ffa8ea0b84cf179ac47323e4

  • SHA256

    d341e169b19a3805c1cf45770c855a7d5900cc6bc08b1dca5859a6170ac06262

  • SHA512

    33f928719c0d21be1a61a27f19f805bf70482d35b4df92c041f6fc18fe671de40c866e6f6827d55af58f877c38bc5851d7cf316f5b113d2c57ebe17108931daa

  • SSDEEP

    384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSz8:b/yC4GyNM01GuQMNXw2PSo

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\45a7e407be2cfbbaeca7693e867fc544_cryptolocker_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\45a7e407be2cfbbaeca7693e867fc544_cryptolocker_JC.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2800
    • C:\Users\Admin\AppData\Local\Temp\retln.exe
      "C:\Users\Admin\AppData\Local\Temp\retln.exe"
      2⤵
      • Executes dropped EXE
      PID:3924

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\retln.exe

    Filesize

    28KB

    MD5

    944dbd373bb274f027e3adb8a3385339

    SHA1

    e92082bccb7831c4c91f2b33091f55047f69c643

    SHA256

    2e4f9fac61b25d93f101e455fe01732d2521a91c3d0000ba704a23f69a25bb8a

    SHA512

    07ce33f0f216f8f41bba1b251a7872cfd50b7b13c8eafc9fe03ae721ae44c36bdff56c18b6ea44666fa6e3e4f9e6f9beedd372aaaa6b590fb7d0e759f0c43a11

  • C:\Users\Admin\AppData\Local\Temp\retln.exe

    Filesize

    28KB

    MD5

    944dbd373bb274f027e3adb8a3385339

    SHA1

    e92082bccb7831c4c91f2b33091f55047f69c643

    SHA256

    2e4f9fac61b25d93f101e455fe01732d2521a91c3d0000ba704a23f69a25bb8a

    SHA512

    07ce33f0f216f8f41bba1b251a7872cfd50b7b13c8eafc9fe03ae721ae44c36bdff56c18b6ea44666fa6e3e4f9e6f9beedd372aaaa6b590fb7d0e759f0c43a11

  • C:\Users\Admin\AppData\Local\Temp\retln.exe

    Filesize

    28KB

    MD5

    944dbd373bb274f027e3adb8a3385339

    SHA1

    e92082bccb7831c4c91f2b33091f55047f69c643

    SHA256

    2e4f9fac61b25d93f101e455fe01732d2521a91c3d0000ba704a23f69a25bb8a

    SHA512

    07ce33f0f216f8f41bba1b251a7872cfd50b7b13c8eafc9fe03ae721ae44c36bdff56c18b6ea44666fa6e3e4f9e6f9beedd372aaaa6b590fb7d0e759f0c43a11

  • memory/2800-133-0x0000000002250000-0x0000000002256000-memory.dmp

    Filesize

    24KB

  • memory/2800-134-0x0000000002250000-0x0000000002256000-memory.dmp

    Filesize

    24KB

  • memory/2800-135-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/3924-153-0x0000000002180000-0x0000000002186000-memory.dmp

    Filesize

    24KB