Analysis

  • max time kernel
    139s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/08/2023, 10:24

General

  • Target

    50075982a35520afc51305d3084aae2f_cryptolocker_JC.exe

  • Size

    114KB

  • MD5

    50075982a35520afc51305d3084aae2f

  • SHA1

    c0f79f0707223825bcd5a68019cba66f0e537161

  • SHA256

    70ca2062b80e52e4e9026e669a39a403b19266630ed15b8e9c06d9b7929841d3

  • SHA512

    5d19411fdbb99640c2dedbe3126db2e06e4906fd0404f0e37a4fda9983c054e0cf7a59b5c3d0202517ef90783a6ae26562836a08f7144bdbddde4c98ee4e315e

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjQGYQbN/PKwNuj2GQi8b/xv4TSeA9+zmnwxPn:V6a+pOtEvwDpjtzU

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\50075982a35520afc51305d3084aae2f_cryptolocker_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\50075982a35520afc51305d3084aae2f_cryptolocker_JC.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2152
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:4800

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          114KB

          MD5

          243309aa49db592c5fb557043f485f26

          SHA1

          1a9f7e14ecde58f4a9e8a80fc732ee49f17a66df

          SHA256

          ee2401d862530e1470b5967c5f98e60fc9aa99881df3d3b7a188ee476d3798ec

          SHA512

          8d6983fdedd88e81d338d1648ed588bcab1e21a9212f5ad9957320d026e05237ceaa39fe877f73ec0d486172289813dca22848d04dbe58a4ae125ac9d61fdf0f

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          114KB

          MD5

          243309aa49db592c5fb557043f485f26

          SHA1

          1a9f7e14ecde58f4a9e8a80fc732ee49f17a66df

          SHA256

          ee2401d862530e1470b5967c5f98e60fc9aa99881df3d3b7a188ee476d3798ec

          SHA512

          8d6983fdedd88e81d338d1648ed588bcab1e21a9212f5ad9957320d026e05237ceaa39fe877f73ec0d486172289813dca22848d04dbe58a4ae125ac9d61fdf0f

        • C:\Users\Admin\AppData\Local\Temp\asih.exe

          Filesize

          114KB

          MD5

          243309aa49db592c5fb557043f485f26

          SHA1

          1a9f7e14ecde58f4a9e8a80fc732ee49f17a66df

          SHA256

          ee2401d862530e1470b5967c5f98e60fc9aa99881df3d3b7a188ee476d3798ec

          SHA512

          8d6983fdedd88e81d338d1648ed588bcab1e21a9212f5ad9957320d026e05237ceaa39fe877f73ec0d486172289813dca22848d04dbe58a4ae125ac9d61fdf0f

        • memory/2152-133-0x00000000004D0000-0x00000000004D6000-memory.dmp

          Filesize

          24KB

        • memory/2152-134-0x00000000004D0000-0x00000000004D6000-memory.dmp

          Filesize

          24KB

        • memory/2152-135-0x00000000004F0000-0x00000000004F6000-memory.dmp

          Filesize

          24KB

        • memory/4800-150-0x0000000000750000-0x0000000000756000-memory.dmp

          Filesize

          24KB

        • memory/4800-151-0x0000000000620000-0x0000000000626000-memory.dmp

          Filesize

          24KB