Analysis
-
max time kernel
2s -
max time network
6s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2023 15:23
Static task
static1
Behavioral task
behavioral1
Sample
8127392f7f9516dc93bce268255a6aef_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
8127392f7f9516dc93bce268255a6aef_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
8127392f7f9516dc93bce268255a6aef_cryptolocker_JC.exe
-
Size
57KB
-
MD5
8127392f7f9516dc93bce268255a6aef
-
SHA1
3f89e312da75a96e3f2a50f7c69274c2e8a59832
-
SHA256
e4ca43cab7854f809381a616315f4c0313d14bba475ed030da64c426fe0d1e01
-
SHA512
29688ef0fb54b72a78ffe76eb1b54594872e6bcc3964304d1f029352d436d973873ab657611a6d7b4ba0bec16005282fbc4bf62556d090c2bd2c859839420778
-
SSDEEP
1536:X6QFElP6n+gJQMOtEvwDpjBccD2RuoNmuBLZ/a:X6a+SOtEvwDpjBrOy
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2832 wrote to memory of 4796 2832 8127392f7f9516dc93bce268255a6aef_cryptolocker_JC.exe 83 PID 2832 wrote to memory of 4796 2832 8127392f7f9516dc93bce268255a6aef_cryptolocker_JC.exe 83 PID 2832 wrote to memory of 4796 2832 8127392f7f9516dc93bce268255a6aef_cryptolocker_JC.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\8127392f7f9516dc93bce268255a6aef_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\8127392f7f9516dc93bce268255a6aef_cryptolocker_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵PID:4796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD5f2b3983278472d39924d66413ff6a250
SHA12fb2c6cd5cbc34d96e426d4412d6c980ccdff0b4
SHA2566e9e52e99153f58c7928da18c5bffc73ff3618ee6b0c0130eb0688e13d22514f
SHA5122a8882860eea1e0b1d8dcc13e6a10e4cdf81c12400f550aef6cde32eab31486cc2b1fcfe3e278064b0add93735eca1fe868a2e9156642f0173f6bdc4c10ab37f
-
Filesize
57KB
MD5f2b3983278472d39924d66413ff6a250
SHA12fb2c6cd5cbc34d96e426d4412d6c980ccdff0b4
SHA2566e9e52e99153f58c7928da18c5bffc73ff3618ee6b0c0130eb0688e13d22514f
SHA5122a8882860eea1e0b1d8dcc13e6a10e4cdf81c12400f550aef6cde32eab31486cc2b1fcfe3e278064b0add93735eca1fe868a2e9156642f0173f6bdc4c10ab37f
-
Filesize
57KB
MD5f2b3983278472d39924d66413ff6a250
SHA12fb2c6cd5cbc34d96e426d4412d6c980ccdff0b4
SHA2566e9e52e99153f58c7928da18c5bffc73ff3618ee6b0c0130eb0688e13d22514f
SHA5122a8882860eea1e0b1d8dcc13e6a10e4cdf81c12400f550aef6cde32eab31486cc2b1fcfe3e278064b0add93735eca1fe868a2e9156642f0173f6bdc4c10ab37f