Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
24-08-2023 19:12
Static task
static1
Behavioral task
behavioral1
Sample
8b08a527905ef9128eb609da616c4ea3_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
8b08a527905ef9128eb609da616c4ea3_cryptolocker_JC.exe
Resource
win10v2004-20230824-en
General
-
Target
8b08a527905ef9128eb609da616c4ea3_cryptolocker_JC.exe
-
Size
88KB
-
MD5
8b08a527905ef9128eb609da616c4ea3
-
SHA1
c6edbf6a963e42d638765c38cb6814003cff34de
-
SHA256
5f993af590c80fd5722a4ad55994c249097766ba38be23351081138b94eaceea
-
SHA512
78684327d15d4cbb934a9f0e76c601619df383a704b0ff42012359d7bedf8b339be586bba959323f2b5482153484d795f1e993b289660bc2e2e6832d7650c95a
-
SSDEEP
768:xQz7yVEhs9+4uR1bytOOtEvwDpjWfbZ7uyA36S7MpxRiWNa9mD:xj+VGMOtEvwDpjubwQEIiVmD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2836 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1080 8b08a527905ef9128eb609da616c4ea3_cryptolocker_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1080 wrote to memory of 2836 1080 8b08a527905ef9128eb609da616c4ea3_cryptolocker_JC.exe 28 PID 1080 wrote to memory of 2836 1080 8b08a527905ef9128eb609da616c4ea3_cryptolocker_JC.exe 28 PID 1080 wrote to memory of 2836 1080 8b08a527905ef9128eb609da616c4ea3_cryptolocker_JC.exe 28 PID 1080 wrote to memory of 2836 1080 8b08a527905ef9128eb609da616c4ea3_cryptolocker_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b08a527905ef9128eb609da616c4ea3_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\8b08a527905ef9128eb609da616c4ea3_cryptolocker_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD569103bf3e9217570cfe64a60c0fe9d88
SHA1058cfdd4c751c1640d2a50755a287013d9d75dc8
SHA256d857eedd993b84fbd44c25c5729748dd1b7d54d658be0c241b5368007af359b4
SHA512b6f017f23458145f77cb3582a7c08a6f4992609e18630256a16a8cfe3e96161842d1d8861cf84dfd683e9c9f0a4fb7fab035817d78a580d6a812034d652f165d
-
Filesize
89KB
MD569103bf3e9217570cfe64a60c0fe9d88
SHA1058cfdd4c751c1640d2a50755a287013d9d75dc8
SHA256d857eedd993b84fbd44c25c5729748dd1b7d54d658be0c241b5368007af359b4
SHA512b6f017f23458145f77cb3582a7c08a6f4992609e18630256a16a8cfe3e96161842d1d8861cf84dfd683e9c9f0a4fb7fab035817d78a580d6a812034d652f165d
-
Filesize
89KB
MD569103bf3e9217570cfe64a60c0fe9d88
SHA1058cfdd4c751c1640d2a50755a287013d9d75dc8
SHA256d857eedd993b84fbd44c25c5729748dd1b7d54d658be0c241b5368007af359b4
SHA512b6f017f23458145f77cb3582a7c08a6f4992609e18630256a16a8cfe3e96161842d1d8861cf84dfd683e9c9f0a4fb7fab035817d78a580d6a812034d652f165d