Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2023 15:13
Static task
static1
Behavioral task
behavioral1
Sample
80cb3e2a0ac372b76001e6d0c5316b83_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
80cb3e2a0ac372b76001e6d0c5316b83_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
80cb3e2a0ac372b76001e6d0c5316b83_cryptolocker_JC.exe
-
Size
57KB
-
MD5
80cb3e2a0ac372b76001e6d0c5316b83
-
SHA1
f899a67f51b92421dc03a19925e063a0a7e0c2ae
-
SHA256
86aca6964228ea465a7ce38fba1f571aaf6a239e8b0dfd7544d6f148ab504461
-
SHA512
332d47f4b0277627212c9815a1150de5fc3f33f938a59f7600583a077c80e879f1d31ab744921d425a2b179d766439fbc7e7d7b6a3e03250c87009b0ec2edd51
-
SSDEEP
768:79inqyNR/QtOOtEvwDpjBK/iVTab3GRuv3VylcbL7uxEUSw:79mqyNhQMOtEvwDpjBPY7xv3gy7ux1Sw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3196 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3852 wrote to memory of 3196 3852 80cb3e2a0ac372b76001e6d0c5316b83_cryptolocker_JC.exe 82 PID 3852 wrote to memory of 3196 3852 80cb3e2a0ac372b76001e6d0c5316b83_cryptolocker_JC.exe 82 PID 3852 wrote to memory of 3196 3852 80cb3e2a0ac372b76001e6d0c5316b83_cryptolocker_JC.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\80cb3e2a0ac372b76001e6d0c5316b83_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\80cb3e2a0ac372b76001e6d0c5316b83_cryptolocker_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:3196
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD5db0c1bc8b2533a96b09d1b8a2434f4f5
SHA1940cb771e95347a6da3e3dba328636f0679e7fdc
SHA25629b0438efa86b4f3ee821d1f2a04485711b7cf82926a6c9b56b7cd0ca81198dc
SHA51217af18fcfa50a0536f6ac36c5f186c55da3144978e53c37304ab283e09ead956ae8882cacd81fef9f93cfade831d2c86851d5168189ca6dfd9d66d401aab31cd
-
Filesize
58KB
MD5db0c1bc8b2533a96b09d1b8a2434f4f5
SHA1940cb771e95347a6da3e3dba328636f0679e7fdc
SHA25629b0438efa86b4f3ee821d1f2a04485711b7cf82926a6c9b56b7cd0ca81198dc
SHA51217af18fcfa50a0536f6ac36c5f186c55da3144978e53c37304ab283e09ead956ae8882cacd81fef9f93cfade831d2c86851d5168189ca6dfd9d66d401aab31cd
-
Filesize
58KB
MD5db0c1bc8b2533a96b09d1b8a2434f4f5
SHA1940cb771e95347a6da3e3dba328636f0679e7fdc
SHA25629b0438efa86b4f3ee821d1f2a04485711b7cf82926a6c9b56b7cd0ca81198dc
SHA51217af18fcfa50a0536f6ac36c5f186c55da3144978e53c37304ab283e09ead956ae8882cacd81fef9f93cfade831d2c86851d5168189ca6dfd9d66d401aab31cd