Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
25/08/2023, 16:14
Static task
static1
Behavioral task
behavioral1
Sample
9daddb7d2d827deffdf6d33c4f5653a0_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
9daddb7d2d827deffdf6d33c4f5653a0_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
9daddb7d2d827deffdf6d33c4f5653a0_cryptolocker_JC.exe
-
Size
46KB
-
MD5
9daddb7d2d827deffdf6d33c4f5653a0
-
SHA1
9d4f858a5a948a093015bc034edd081c50df4013
-
SHA256
5d6562e19ac10037e452c1b449e4e10faaac26d6f4b7c30a8acfbed7ffbdf765
-
SHA512
fe2b5782648aa79944d77e413da87edffe7a9178b04b51fec344285aa8c585441efc92684ee38bacec361ca02803d4b09e42cd4bad93d96c64eb9f720fee9764
-
SSDEEP
768:bIDOw9UiaCHfjnE0Sfa7ilR0p9u6p4ICNBC1Sle4:bIDOw9a0DwitDZ0le4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2472 lossy.exe -
Loads dropped DLL 1 IoCs
pid Process 2056 9daddb7d2d827deffdf6d33c4f5653a0_cryptolocker_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2472 2056 9daddb7d2d827deffdf6d33c4f5653a0_cryptolocker_JC.exe 28 PID 2056 wrote to memory of 2472 2056 9daddb7d2d827deffdf6d33c4f5653a0_cryptolocker_JC.exe 28 PID 2056 wrote to memory of 2472 2056 9daddb7d2d827deffdf6d33c4f5653a0_cryptolocker_JC.exe 28 PID 2056 wrote to memory of 2472 2056 9daddb7d2d827deffdf6d33c4f5653a0_cryptolocker_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\9daddb7d2d827deffdf6d33c4f5653a0_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\9daddb7d2d827deffdf6d33c4f5653a0_cryptolocker_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\lossy.exe"C:\Users\Admin\AppData\Local\Temp\lossy.exe"2⤵
- Executes dropped EXE
PID:2472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD5c4c2913772e4adec3a21b9d1fa3b0d46
SHA192ef0f5fddf8eb689590bcff1a31a1797c82d583
SHA256890e359d9b7541afc388bad5770bf0560ef02687fb0023d5aef6c7db35755a8b
SHA5127542a550670526db722e972f7f34a7219dd87961ce7811448496e5abf97fccc5ab99a04037081b58c58afa09853945d6bb435cb0fcae89c6f6f037b5bd03ec99
-
Filesize
46KB
MD5c4c2913772e4adec3a21b9d1fa3b0d46
SHA192ef0f5fddf8eb689590bcff1a31a1797c82d583
SHA256890e359d9b7541afc388bad5770bf0560ef02687fb0023d5aef6c7db35755a8b
SHA5127542a550670526db722e972f7f34a7219dd87961ce7811448496e5abf97fccc5ab99a04037081b58c58afa09853945d6bb435cb0fcae89c6f6f037b5bd03ec99
-
Filesize
46KB
MD5c4c2913772e4adec3a21b9d1fa3b0d46
SHA192ef0f5fddf8eb689590bcff1a31a1797c82d583
SHA256890e359d9b7541afc388bad5770bf0560ef02687fb0023d5aef6c7db35755a8b
SHA5127542a550670526db722e972f7f34a7219dd87961ce7811448496e5abf97fccc5ab99a04037081b58c58afa09853945d6bb435cb0fcae89c6f6f037b5bd03ec99