Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
22-08-2023 15:14
Static task
static1
Behavioral task
behavioral1
Sample
67bba9128dbcbde0e4fac763b639eb5b_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
67bba9128dbcbde0e4fac763b639eb5b_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
67bba9128dbcbde0e4fac763b639eb5b_cryptolocker_JC.exe
-
Size
28KB
-
MD5
67bba9128dbcbde0e4fac763b639eb5b
-
SHA1
4f23519f0482d05511e8669223fcf66b37a2df46
-
SHA256
ab04d0864f9195cadf9610505f4a90bd0d5070ee54629a44b12d89bde63e1735
-
SHA512
a8c38713810b6083ae57cf18bea49ea9d2aad91f40f7e83d4d2f6315a978be275945366feb28f22bb99ccb3b992878444f423a242236b62d74c65683178d18da
-
SSDEEP
384:bA74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUgIun3:bA74zYcgT/Ekd0ryfjPIun3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2272 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 1328 67bba9128dbcbde0e4fac763b639eb5b_cryptolocker_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1328 wrote to memory of 2272 1328 67bba9128dbcbde0e4fac763b639eb5b_cryptolocker_JC.exe 28 PID 1328 wrote to memory of 2272 1328 67bba9128dbcbde0e4fac763b639eb5b_cryptolocker_JC.exe 28 PID 1328 wrote to memory of 2272 1328 67bba9128dbcbde0e4fac763b639eb5b_cryptolocker_JC.exe 28 PID 1328 wrote to memory of 2272 1328 67bba9128dbcbde0e4fac763b639eb5b_cryptolocker_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\67bba9128dbcbde0e4fac763b639eb5b_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\67bba9128dbcbde0e4fac763b639eb5b_cryptolocker_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD52922344f0f97c4b3f4c87ce370c992c1
SHA147b22019d9910d311b76d141e6ce243b9c569c68
SHA256165ea0f443f47ba834f8b52c45dd82565f8da050b0d935ca5578254e5ab6376a
SHA51255d7086f4e8dbceac1a9bb92316e30520c79483343ec12017aa2f64d9a1c95e5dca2d414f6db1e55c6e5562725b204379621e11b6abdcc5cf0695478b900feee
-
Filesize
29KB
MD52922344f0f97c4b3f4c87ce370c992c1
SHA147b22019d9910d311b76d141e6ce243b9c569c68
SHA256165ea0f443f47ba834f8b52c45dd82565f8da050b0d935ca5578254e5ab6376a
SHA51255d7086f4e8dbceac1a9bb92316e30520c79483343ec12017aa2f64d9a1c95e5dca2d414f6db1e55c6e5562725b204379621e11b6abdcc5cf0695478b900feee
-
Filesize
29KB
MD52922344f0f97c4b3f4c87ce370c992c1
SHA147b22019d9910d311b76d141e6ce243b9c569c68
SHA256165ea0f443f47ba834f8b52c45dd82565f8da050b0d935ca5578254e5ab6376a
SHA51255d7086f4e8dbceac1a9bb92316e30520c79483343ec12017aa2f64d9a1c95e5dca2d414f6db1e55c6e5562725b204379621e11b6abdcc5cf0695478b900feee