Analysis

  • max time kernel
    2s
  • max time network
    6s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-08-2023 15:23

General

  • Target

    8127392f7f9516dc93bce268255a6aef_cryptolocker_JC.exe

  • Size

    57KB

  • MD5

    8127392f7f9516dc93bce268255a6aef

  • SHA1

    3f89e312da75a96e3f2a50f7c69274c2e8a59832

  • SHA256

    e4ca43cab7854f809381a616315f4c0313d14bba475ed030da64c426fe0d1e01

  • SHA512

    29688ef0fb54b72a78ffe76eb1b54594872e6bcc3964304d1f029352d436d973873ab657611a6d7b4ba0bec16005282fbc4bf62556d090c2bd2c859839420778

  • SSDEEP

    1536:X6QFElP6n+gJQMOtEvwDpjBccD2RuoNmuBLZ/a:X6a+SOtEvwDpjBrOy

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8127392f7f9516dc93bce268255a6aef_cryptolocker_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\8127392f7f9516dc93bce268255a6aef_cryptolocker_JC.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2832
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
        PID:4796

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\asih.exe

      Filesize

      57KB

      MD5

      f2b3983278472d39924d66413ff6a250

      SHA1

      2fb2c6cd5cbc34d96e426d4412d6c980ccdff0b4

      SHA256

      6e9e52e99153f58c7928da18c5bffc73ff3618ee6b0c0130eb0688e13d22514f

      SHA512

      2a8882860eea1e0b1d8dcc13e6a10e4cdf81c12400f550aef6cde32eab31486cc2b1fcfe3e278064b0add93735eca1fe868a2e9156642f0173f6bdc4c10ab37f

    • C:\Users\Admin\AppData\Local\Temp\asih.exe

      Filesize

      57KB

      MD5

      f2b3983278472d39924d66413ff6a250

      SHA1

      2fb2c6cd5cbc34d96e426d4412d6c980ccdff0b4

      SHA256

      6e9e52e99153f58c7928da18c5bffc73ff3618ee6b0c0130eb0688e13d22514f

      SHA512

      2a8882860eea1e0b1d8dcc13e6a10e4cdf81c12400f550aef6cde32eab31486cc2b1fcfe3e278064b0add93735eca1fe868a2e9156642f0173f6bdc4c10ab37f

    • C:\Users\Admin\AppData\Local\Temp\asih.exe

      Filesize

      57KB

      MD5

      f2b3983278472d39924d66413ff6a250

      SHA1

      2fb2c6cd5cbc34d96e426d4412d6c980ccdff0b4

      SHA256

      6e9e52e99153f58c7928da18c5bffc73ff3618ee6b0c0130eb0688e13d22514f

      SHA512

      2a8882860eea1e0b1d8dcc13e6a10e4cdf81c12400f550aef6cde32eab31486cc2b1fcfe3e278064b0add93735eca1fe868a2e9156642f0173f6bdc4c10ab37f

    • memory/2832-0-0x00000000004D0000-0x00000000004D6000-memory.dmp

      Filesize

      24KB

    • memory/2832-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

      Filesize

      24KB

    • memory/2832-2-0x00000000004F0000-0x00000000004F6000-memory.dmp

      Filesize

      24KB