Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    22-08-2023 16:15

General

  • Target

    6a937ccbf7437a2f0bba6eafa5fc016e_cryptolocker_JC.exe

  • Size

    40KB

  • MD5

    6a937ccbf7437a2f0bba6eafa5fc016e

  • SHA1

    99a5c06cec5ffb17c491365990774528786c0236

  • SHA256

    be933fc669c90c53d13c765efcc3aef219af575b2125d8347785333a71d699cd

  • SHA512

    0eb90b053febfd8ed61c0836092457af29fa07b33fe5ade9b4e3db2240b42b27ef0f655ae89de69ed57fe34b2c9766ca08eb40db9c468820bb92d8ca3bf43498

  • SSDEEP

    384:bgX4uGLLQRcsdeQ7/nQu63Ag7YmecFanrlwfjDUkKDfWf6XT+72kmGYjlQxIHvOt:bgX4zYcgTEu6QOaryfjqDlC7rYZQKHvi

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a937ccbf7437a2f0bba6eafa5fc016e_cryptolocker_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\6a937ccbf7437a2f0bba6eafa5fc016e_cryptolocker_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2564
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    40KB

    MD5

    334adccdc3974dfd9ba45f4e2c39abf8

    SHA1

    6a91ff48a107b919c500d8893bb23464da20fad6

    SHA256

    96435c0654187b9e5faf7aca7c328a43a9bf8fec8e3d6f7b0733fd8b7edafebb

    SHA512

    e07e694b192fab5b4da0c86bc4193edc2bb87f821b2cc30b4164c148571bf9ac7148f73c83210e656f5d33c3b7d8c9809fe2d392c7a16535acbfb0c602e5a8d9

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    40KB

    MD5

    334adccdc3974dfd9ba45f4e2c39abf8

    SHA1

    6a91ff48a107b919c500d8893bb23464da20fad6

    SHA256

    96435c0654187b9e5faf7aca7c328a43a9bf8fec8e3d6f7b0733fd8b7edafebb

    SHA512

    e07e694b192fab5b4da0c86bc4193edc2bb87f821b2cc30b4164c148571bf9ac7148f73c83210e656f5d33c3b7d8c9809fe2d392c7a16535acbfb0c602e5a8d9

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    40KB

    MD5

    334adccdc3974dfd9ba45f4e2c39abf8

    SHA1

    6a91ff48a107b919c500d8893bb23464da20fad6

    SHA256

    96435c0654187b9e5faf7aca7c328a43a9bf8fec8e3d6f7b0733fd8b7edafebb

    SHA512

    e07e694b192fab5b4da0c86bc4193edc2bb87f821b2cc30b4164c148571bf9ac7148f73c83210e656f5d33c3b7d8c9809fe2d392c7a16535acbfb0c602e5a8d9

  • memory/2564-54-0x0000000001C80000-0x0000000001C86000-memory.dmp

    Filesize

    24KB

  • memory/2564-55-0x0000000001CA0000-0x0000000001CA6000-memory.dmp

    Filesize

    24KB

  • memory/2564-56-0x0000000001C80000-0x0000000001C86000-memory.dmp

    Filesize

    24KB

  • memory/2832-69-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/2832-70-0x0000000000470000-0x0000000000476000-memory.dmp

    Filesize

    24KB