Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
23/08/2023, 16:22
Static task
static1
Behavioral task
behavioral1
Sample
77c1de68df7f5cc99be1ca491d99fa71_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
77c1de68df7f5cc99be1ca491d99fa71_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
77c1de68df7f5cc99be1ca491d99fa71_cryptolocker_JC.exe
-
Size
61KB
-
MD5
77c1de68df7f5cc99be1ca491d99fa71
-
SHA1
43c629eb69393380d5964be030ca536e0c412331
-
SHA256
0e5e396a22957914a48dbbea24dd8d87e339d28a24f544fe87953ead21aa8218
-
SHA512
25aa6bd45d7aa503be9e2048e06642949404443b2fa40ee2c7668dcb5c9c6bb78d7b8ee8e5165317ae76dfe1dfd19c80142f725d04402201a57c749b2e91f33b
-
SSDEEP
1536:X6QFElP6n+gJQMOtEvwDpjBccD2RuoNmuBLZ/cMQGqTY:X6a+SOtEvwDpjBrOb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2640 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2600 77c1de68df7f5cc99be1ca491d99fa71_cryptolocker_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2600 wrote to memory of 2640 2600 77c1de68df7f5cc99be1ca491d99fa71_cryptolocker_JC.exe 28 PID 2600 wrote to memory of 2640 2600 77c1de68df7f5cc99be1ca491d99fa71_cryptolocker_JC.exe 28 PID 2600 wrote to memory of 2640 2600 77c1de68df7f5cc99be1ca491d99fa71_cryptolocker_JC.exe 28 PID 2600 wrote to memory of 2640 2600 77c1de68df7f5cc99be1ca491d99fa71_cryptolocker_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\77c1de68df7f5cc99be1ca491d99fa71_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\77c1de68df7f5cc99be1ca491d99fa71_cryptolocker_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5aad02c5375a51abaf7f3a34e2ada2a8a
SHA16e050c17e498bf7f74e1d1e69d1e29b7cf89f505
SHA25693c550811f0d45836b12d6bbdf349e16bc6647b9f6242f97e6f25c4750c9eee7
SHA5121250973a05d36096c96da981c815e7a7feb7ded7f332059ad48948c549f1015fbcb53376d02ba0111e0a39f6d0ff410fcc2508477da60fa5dfb0d83b4ba8558b
-
Filesize
61KB
MD5aad02c5375a51abaf7f3a34e2ada2a8a
SHA16e050c17e498bf7f74e1d1e69d1e29b7cf89f505
SHA25693c550811f0d45836b12d6bbdf349e16bc6647b9f6242f97e6f25c4750c9eee7
SHA5121250973a05d36096c96da981c815e7a7feb7ded7f332059ad48948c549f1015fbcb53376d02ba0111e0a39f6d0ff410fcc2508477da60fa5dfb0d83b4ba8558b
-
Filesize
61KB
MD5aad02c5375a51abaf7f3a34e2ada2a8a
SHA16e050c17e498bf7f74e1d1e69d1e29b7cf89f505
SHA25693c550811f0d45836b12d6bbdf349e16bc6647b9f6242f97e6f25c4750c9eee7
SHA5121250973a05d36096c96da981c815e7a7feb7ded7f332059ad48948c549f1015fbcb53376d02ba0111e0a39f6d0ff410fcc2508477da60fa5dfb0d83b4ba8558b