Analysis

  • max time kernel
    1s
  • max time network
    6s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/08/2023, 17:40

General

  • Target

    636fb24598fc1024b5af26d2685f5e61_cryptolocker_JC.exe

  • Size

    113KB

  • MD5

    636fb24598fc1024b5af26d2685f5e61

  • SHA1

    937a379f49ee51a373c9e70baa05785113776f3f

  • SHA256

    dcae6c1b8c24786dfbf27c92c0c94a9ab7984deb404a4d63702f0840b6a5683a

  • SHA512

    130fc30ec59e03f6715aae7b49b28996136d733b58ad322abba421f23e44279d14c1856d293733e5bdacabb6090bbe29709ced7b9c28e1c9dd3b6734d1da0a4e

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNgp+oxGz:T6a+rdOOtEvwDpjLzX

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\636fb24598fc1024b5af26d2685f5e61_cryptolocker_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\636fb24598fc1024b5af26d2685f5e61_cryptolocker_JC.exe"
    1⤵
      PID:4052
      • C:\Users\Admin\AppData\Local\Temp\asih.exe
        "C:\Users\Admin\AppData\Local\Temp\asih.exe"
        2⤵
          PID:4320

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\asih.exe

              Filesize

              113KB

              MD5

              74b7bf6e693eacbb2ed2c185342d4b87

              SHA1

              2c11b7f0c8dc7100e3d8e33b3ab87d176be178a8

              SHA256

              f2865934337320b7f8b95d7316ffee8cf6803f403c239f3b118db5c101be8b54

              SHA512

              d956251885038f79e7d35490af170955b58ab7f1b2e1976c402db105d9f01a13e9d113831af7f32e963fa1ab56c4d2f36361295f9c3df1db40768de50a9fe70e

            • C:\Users\Admin\AppData\Local\Temp\asih.exe

              Filesize

              113KB

              MD5

              74b7bf6e693eacbb2ed2c185342d4b87

              SHA1

              2c11b7f0c8dc7100e3d8e33b3ab87d176be178a8

              SHA256

              f2865934337320b7f8b95d7316ffee8cf6803f403c239f3b118db5c101be8b54

              SHA512

              d956251885038f79e7d35490af170955b58ab7f1b2e1976c402db105d9f01a13e9d113831af7f32e963fa1ab56c4d2f36361295f9c3df1db40768de50a9fe70e

            • C:\Users\Admin\AppData\Local\Temp\asih.exe

              Filesize

              113KB

              MD5

              74b7bf6e693eacbb2ed2c185342d4b87

              SHA1

              2c11b7f0c8dc7100e3d8e33b3ab87d176be178a8

              SHA256

              f2865934337320b7f8b95d7316ffee8cf6803f403c239f3b118db5c101be8b54

              SHA512

              d956251885038f79e7d35490af170955b58ab7f1b2e1976c402db105d9f01a13e9d113831af7f32e963fa1ab56c4d2f36361295f9c3df1db40768de50a9fe70e

            • memory/4052-133-0x0000000000500000-0x0000000000510000-memory.dmp

              Filesize

              64KB

            • memory/4052-134-0x00000000021E0000-0x00000000021E6000-memory.dmp

              Filesize

              24KB

            • memory/4052-135-0x00000000021E0000-0x00000000021E6000-memory.dmp

              Filesize

              24KB

            • memory/4052-136-0x0000000002060000-0x0000000002066000-memory.dmp

              Filesize

              24KB

            • memory/4052-150-0x0000000000500000-0x0000000000510000-memory.dmp

              Filesize

              64KB