Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
23/08/2023, 16:11
Behavioral task
behavioral1
Sample
77469c681035f60e37deb2c99456a8f4_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
77469c681035f60e37deb2c99456a8f4_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
77469c681035f60e37deb2c99456a8f4_cryptolocker_JC.exe
-
Size
54KB
-
MD5
77469c681035f60e37deb2c99456a8f4
-
SHA1
7235ad8e729b750013b94b419a2b518065276eef
-
SHA256
636fb44de8ce4e727771858748d3240a3ea6dbbc12422a945234637548cb4543
-
SHA512
350f6bdb479a56ab6502600bc11edaaf0267bdd6fbed842c505fd6ebf87b838ded89a2f9a52f325f23efb7974677ff20ef6778d230de0432591cab35659730c9
-
SSDEEP
768:zQz7yVEhs9+syJP6ntOOtEvwDpjFeV0ZOfcpea:zj+soPSMOtEvwDpj4yya
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2604 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2304 77469c681035f60e37deb2c99456a8f4_cryptolocker_JC.exe -
resource yara_rule behavioral1/memory/2304-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000a000000012029-11.dat upx behavioral1/memory/2304-15-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2604-17-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000a000000012029-16.dat upx behavioral1/memory/2304-13-0x00000000026C0000-0x00000000026D0000-memory.dmp upx behavioral1/files/0x000a000000012029-26.dat upx behavioral1/memory/2604-28-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2604 2304 77469c681035f60e37deb2c99456a8f4_cryptolocker_JC.exe 28 PID 2304 wrote to memory of 2604 2304 77469c681035f60e37deb2c99456a8f4_cryptolocker_JC.exe 28 PID 2304 wrote to memory of 2604 2304 77469c681035f60e37deb2c99456a8f4_cryptolocker_JC.exe 28 PID 2304 wrote to memory of 2604 2304 77469c681035f60e37deb2c99456a8f4_cryptolocker_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\77469c681035f60e37deb2c99456a8f4_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\77469c681035f60e37deb2c99456a8f4_cryptolocker_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD59d137dfdb188b338950ea3ac50219b6f
SHA12e4846c7fdd865793bd4d828c38ad70f497ee62e
SHA2567e2c16d1d99abb59259edd67570154f02782450f2795c73e36f0f9fede7fb450
SHA512c411116c8c05e1efc6bcbaec1de07c3192eaf8867a6f91b99d61a478607270f85dfe283ee9d8ae9bc05c54238a24c8cce192345286e916e8e429baf7124828a6
-
Filesize
54KB
MD59d137dfdb188b338950ea3ac50219b6f
SHA12e4846c7fdd865793bd4d828c38ad70f497ee62e
SHA2567e2c16d1d99abb59259edd67570154f02782450f2795c73e36f0f9fede7fb450
SHA512c411116c8c05e1efc6bcbaec1de07c3192eaf8867a6f91b99d61a478607270f85dfe283ee9d8ae9bc05c54238a24c8cce192345286e916e8e429baf7124828a6
-
Filesize
54KB
MD59d137dfdb188b338950ea3ac50219b6f
SHA12e4846c7fdd865793bd4d828c38ad70f497ee62e
SHA2567e2c16d1d99abb59259edd67570154f02782450f2795c73e36f0f9fede7fb450
SHA512c411116c8c05e1efc6bcbaec1de07c3192eaf8867a6f91b99d61a478607270f85dfe283ee9d8ae9bc05c54238a24c8cce192345286e916e8e429baf7124828a6