Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
22-08-2023 18:01
Static task
static1
Behavioral task
behavioral1
Sample
6ffdbf0be2433af769082d51d295819e_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
6ffdbf0be2433af769082d51d295819e_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
6ffdbf0be2433af769082d51d295819e_cryptolocker_JC.exe
-
Size
30KB
-
MD5
6ffdbf0be2433af769082d51d295819e
-
SHA1
c3812f78acfe07d083f10ce4f905c7a9048a5580
-
SHA256
0019b8744dd13a0d468748f2e8f0c49bfa58a346e64fb81af5d4f8aea145f931
-
SHA512
fe01d1bee14bed1289d6246b63db8f81c390321a7f1c93a69e197901ce43f9dceb3457084abfb565c9efe0950af866de3988195c5f74d557a41413ed30b233c7
-
SSDEEP
384:u0VkMq01bJ3wtEwPS8HLEh+Jagz+3be+26Rsn1rCcOQtOOtEvwDpjqIGRS/Vb9Da:uQz7yVEhs9+js1SQtOOtEvwDpjzK
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2928 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2384 6ffdbf0be2433af769082d51d295819e_cryptolocker_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2928 2384 6ffdbf0be2433af769082d51d295819e_cryptolocker_JC.exe 28 PID 2384 wrote to memory of 2928 2384 6ffdbf0be2433af769082d51d295819e_cryptolocker_JC.exe 28 PID 2384 wrote to memory of 2928 2384 6ffdbf0be2433af769082d51d295819e_cryptolocker_JC.exe 28 PID 2384 wrote to memory of 2928 2384 6ffdbf0be2433af769082d51d295819e_cryptolocker_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ffdbf0be2433af769082d51d295819e_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\6ffdbf0be2433af769082d51d295819e_cryptolocker_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD5b07d16cfec6ccfcb21415dadc3d3a9b6
SHA12db16cb2e4c2dc93e1bcba785b6aeef6c7bdba92
SHA25616716744c71918fe9405127179b10b1c5084491c167c071723e7b71504f5b0dc
SHA512f3f8f81fe961f9cdaaf1bcc5f58e165d23c1ed821f3ad621210a76dc260a2809f90c4593cd4ad969d4e0403b11b2341c885cb76e919dd4ce30fb541af9257128
-
Filesize
30KB
MD5b07d16cfec6ccfcb21415dadc3d3a9b6
SHA12db16cb2e4c2dc93e1bcba785b6aeef6c7bdba92
SHA25616716744c71918fe9405127179b10b1c5084491c167c071723e7b71504f5b0dc
SHA512f3f8f81fe961f9cdaaf1bcc5f58e165d23c1ed821f3ad621210a76dc260a2809f90c4593cd4ad969d4e0403b11b2341c885cb76e919dd4ce30fb541af9257128
-
Filesize
30KB
MD5b07d16cfec6ccfcb21415dadc3d3a9b6
SHA12db16cb2e4c2dc93e1bcba785b6aeef6c7bdba92
SHA25616716744c71918fe9405127179b10b1c5084491c167c071723e7b71504f5b0dc
SHA512f3f8f81fe961f9cdaaf1bcc5f58e165d23c1ed821f3ad621210a76dc260a2809f90c4593cd4ad969d4e0403b11b2341c885cb76e919dd4ce30fb541af9257128