Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
19/08/2023, 14:16
Behavioral task
behavioral1
Sample
439b92ca637d1b9533c984454da6325c_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
439b92ca637d1b9533c984454da6325c_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
439b92ca637d1b9533c984454da6325c_cryptolocker_JC.exe
-
Size
85KB
-
MD5
439b92ca637d1b9533c984454da6325c
-
SHA1
a2865b9ff93656dd26974f3350536ad23227a327
-
SHA256
27b488af691a578c184ba878dc4158a32fa094a8f1d655a7dca8ab708d9e165a
-
SHA512
0de044cb9ebb6e64e4230e63fbcc01497f8ffc060f067570a87c3c467d0be93c271e26e7f4620151199714942395b53e24268e3084e2a2226fe7e2d1389f2e0d
-
SSDEEP
768:qkmnjFom/kLyMro2GtOOtEvwDpjeY10Y/YMsvlMdwPK80GQuG0utZH5:qkmnpomddpMOtEvwDpjJGYQbN/PKwNC5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2152 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2604 439b92ca637d1b9533c984454da6325c_cryptolocker_JC.exe -
resource yara_rule behavioral1/memory/2604-53-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/files/0x0008000000012023-64.dat upx behavioral1/memory/2152-70-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/files/0x0008000000012023-69.dat upx behavioral1/memory/2604-68-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/files/0x0008000000012023-78.dat upx behavioral1/memory/2152-79-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2152 2604 439b92ca637d1b9533c984454da6325c_cryptolocker_JC.exe 28 PID 2604 wrote to memory of 2152 2604 439b92ca637d1b9533c984454da6325c_cryptolocker_JC.exe 28 PID 2604 wrote to memory of 2152 2604 439b92ca637d1b9533c984454da6325c_cryptolocker_JC.exe 28 PID 2604 wrote to memory of 2152 2604 439b92ca637d1b9533c984454da6325c_cryptolocker_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\439b92ca637d1b9533c984454da6325c_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\439b92ca637d1b9533c984454da6325c_cryptolocker_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85KB
MD5ef4fe20e26c58f809430351b9b233e68
SHA15ca809222a48e105e00bca1335d89c8cbe007383
SHA256b00766b3583bc4654f47211749a966e54a60714ce529957fd9966e8cfde2d958
SHA512a2800ddea6e708e71638f0eba62644e6d097a3905f3d5d3065a3fa442126bdc0aa8b4dffbd3a0b2acd7643595d65d436fd0e2c25594d28b58843479a9b988909
-
Filesize
85KB
MD5ef4fe20e26c58f809430351b9b233e68
SHA15ca809222a48e105e00bca1335d89c8cbe007383
SHA256b00766b3583bc4654f47211749a966e54a60714ce529957fd9966e8cfde2d958
SHA512a2800ddea6e708e71638f0eba62644e6d097a3905f3d5d3065a3fa442126bdc0aa8b4dffbd3a0b2acd7643595d65d436fd0e2c25594d28b58843479a9b988909
-
Filesize
85KB
MD5ef4fe20e26c58f809430351b9b233e68
SHA15ca809222a48e105e00bca1335d89c8cbe007383
SHA256b00766b3583bc4654f47211749a966e54a60714ce529957fd9966e8cfde2d958
SHA512a2800ddea6e708e71638f0eba62644e6d097a3905f3d5d3065a3fa442126bdc0aa8b4dffbd3a0b2acd7643595d65d436fd0e2c25594d28b58843479a9b988909