Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/08/2023, 16:38

General

  • Target

    b2afd702e179bbcc161c63966b0c901a_cryptolocker_JC.exe

  • Size

    61KB

  • MD5

    b2afd702e179bbcc161c63966b0c901a

  • SHA1

    e45eca3b60a8b2237660e8a035f0535c07515bdd

  • SHA256

    e3bfa9db35975555eb156f330f08522091f4f79c891e3fda7fffab820e68f09f

  • SHA512

    ee235cb89db48a4916e4062d455a363434c3eb8e1e731c2bbdb7a5a8b9479730909252e5e098d5197281a1866b5bd27210927609d2ea93ab611654af548a02fe

  • SSDEEP

    1536:X6QFElP6n+gJQMOtEvwDpjBccD2RuoNmuBLZ/cMQGqTh:X6a+SOtEvwDpjBrOW

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b2afd702e179bbcc161c63966b0c901a_cryptolocker_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\b2afd702e179bbcc161c63966b0c901a_cryptolocker_JC.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1256
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    61KB

    MD5

    59c2c5b05a84aa35b0d4126a59b660bb

    SHA1

    506832feba7cdf567c52ef2fb9b77d2f34d24d22

    SHA256

    4564c648a17d81ccf7485fb449f34a03fe39ba50237d11d44907d1235e7b90f3

    SHA512

    8dbb0ed1974ab78b04c6a4889e1c084581f926ef013f54c4bda74c2a41bb126c45003e3ff38d6f29d04953e3f18f5bb0adbfeab046eb725187b47fb304ae0568

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    61KB

    MD5

    59c2c5b05a84aa35b0d4126a59b660bb

    SHA1

    506832feba7cdf567c52ef2fb9b77d2f34d24d22

    SHA256

    4564c648a17d81ccf7485fb449f34a03fe39ba50237d11d44907d1235e7b90f3

    SHA512

    8dbb0ed1974ab78b04c6a4889e1c084581f926ef013f54c4bda74c2a41bb126c45003e3ff38d6f29d04953e3f18f5bb0adbfeab046eb725187b47fb304ae0568

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    61KB

    MD5

    59c2c5b05a84aa35b0d4126a59b660bb

    SHA1

    506832feba7cdf567c52ef2fb9b77d2f34d24d22

    SHA256

    4564c648a17d81ccf7485fb449f34a03fe39ba50237d11d44907d1235e7b90f3

    SHA512

    8dbb0ed1974ab78b04c6a4889e1c084581f926ef013f54c4bda74c2a41bb126c45003e3ff38d6f29d04953e3f18f5bb0adbfeab046eb725187b47fb304ae0568

  • memory/1256-0-0x0000000000730000-0x0000000000736000-memory.dmp

    Filesize

    24KB

  • memory/1256-1-0x0000000000730000-0x0000000000736000-memory.dmp

    Filesize

    24KB

  • memory/1256-2-0x0000000000750000-0x0000000000756000-memory.dmp

    Filesize

    24KB

  • memory/2816-18-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/2816-17-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB