Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-08-2023 16:15

General

  • Target

    6a937ccbf7437a2f0bba6eafa5fc016e_cryptolocker_JC.exe

  • Size

    40KB

  • MD5

    6a937ccbf7437a2f0bba6eafa5fc016e

  • SHA1

    99a5c06cec5ffb17c491365990774528786c0236

  • SHA256

    be933fc669c90c53d13c765efcc3aef219af575b2125d8347785333a71d699cd

  • SHA512

    0eb90b053febfd8ed61c0836092457af29fa07b33fe5ade9b4e3db2240b42b27ef0f655ae89de69ed57fe34b2c9766ca08eb40db9c468820bb92d8ca3bf43498

  • SSDEEP

    384:bgX4uGLLQRcsdeQ7/nQu63Ag7YmecFanrlwfjDUkKDfWf6XT+72kmGYjlQxIHvOt:bgX4zYcgTEu6QOaryfjqDlC7rYZQKHvi

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a937ccbf7437a2f0bba6eafa5fc016e_cryptolocker_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\6a937ccbf7437a2f0bba6eafa5fc016e_cryptolocker_JC.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3820
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2272

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    40KB

    MD5

    334adccdc3974dfd9ba45f4e2c39abf8

    SHA1

    6a91ff48a107b919c500d8893bb23464da20fad6

    SHA256

    96435c0654187b9e5faf7aca7c328a43a9bf8fec8e3d6f7b0733fd8b7edafebb

    SHA512

    e07e694b192fab5b4da0c86bc4193edc2bb87f821b2cc30b4164c148571bf9ac7148f73c83210e656f5d33c3b7d8c9809fe2d392c7a16535acbfb0c602e5a8d9

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    40KB

    MD5

    334adccdc3974dfd9ba45f4e2c39abf8

    SHA1

    6a91ff48a107b919c500d8893bb23464da20fad6

    SHA256

    96435c0654187b9e5faf7aca7c328a43a9bf8fec8e3d6f7b0733fd8b7edafebb

    SHA512

    e07e694b192fab5b4da0c86bc4193edc2bb87f821b2cc30b4164c148571bf9ac7148f73c83210e656f5d33c3b7d8c9809fe2d392c7a16535acbfb0c602e5a8d9

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    40KB

    MD5

    334adccdc3974dfd9ba45f4e2c39abf8

    SHA1

    6a91ff48a107b919c500d8893bb23464da20fad6

    SHA256

    96435c0654187b9e5faf7aca7c328a43a9bf8fec8e3d6f7b0733fd8b7edafebb

    SHA512

    e07e694b192fab5b4da0c86bc4193edc2bb87f821b2cc30b4164c148571bf9ac7148f73c83210e656f5d33c3b7d8c9809fe2d392c7a16535acbfb0c602e5a8d9

  • memory/2272-151-0x0000000002210000-0x0000000002216000-memory.dmp

    Filesize

    24KB

  • memory/2272-150-0x0000000003010000-0x0000000003016000-memory.dmp

    Filesize

    24KB

  • memory/3820-133-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/3820-134-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/3820-135-0x0000000003150000-0x0000000003156000-memory.dmp

    Filesize

    24KB