Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    28-08-2023 15:50

General

  • Target

    bcb0858e0833732b23830524409ff239_cryptolocker_JC.exe

  • Size

    76KB

  • MD5

    bcb0858e0833732b23830524409ff239

  • SHA1

    2ccba903e0f58f53831a9fecde8057ec858ef1c5

  • SHA256

    feb08b2065bcd6efa4ec82e04dcaefd31992e80b6d9323273341296f219500ad

  • SHA512

    e040b517b4140ddf28fd0525f621d53e2e200fedd2726c68985d374128bf934fa4350b9f6efc68c56367f902da9c87d52af09b8a2f72b39bfdfd9a231c9e173f

  • SSDEEP

    1536:Tj+jsMQMOtEvwDpj5HmpJpOUHECgNMo0vp2EMMF:TCjsIOtEvwDpj5HE/OUHnSM7

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bcb0858e0833732b23830524409ff239_cryptolocker_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\bcb0858e0833732b23830524409ff239_cryptolocker_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:1012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    76KB

    MD5

    d57080d600a68b014e065c00c5413929

    SHA1

    98db644c6353506bcbacf4f1ebb95a03fbcf6bde

    SHA256

    e59294479060bcb7ca201d642250d0f92ee5681d1f1ada0641753d432530e2e2

    SHA512

    4e4eb6d40425994eafc26090fed1558afef4194f9223bde34470a4805b396fee7a3ec5b17d43b28b7546b9fa8734fa405046d65bd10dc922fe65c5d7d5342c6e

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    76KB

    MD5

    d57080d600a68b014e065c00c5413929

    SHA1

    98db644c6353506bcbacf4f1ebb95a03fbcf6bde

    SHA256

    e59294479060bcb7ca201d642250d0f92ee5681d1f1ada0641753d432530e2e2

    SHA512

    4e4eb6d40425994eafc26090fed1558afef4194f9223bde34470a4805b396fee7a3ec5b17d43b28b7546b9fa8734fa405046d65bd10dc922fe65c5d7d5342c6e

  • \Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    76KB

    MD5

    d57080d600a68b014e065c00c5413929

    SHA1

    98db644c6353506bcbacf4f1ebb95a03fbcf6bde

    SHA256

    e59294479060bcb7ca201d642250d0f92ee5681d1f1ada0641753d432530e2e2

    SHA512

    4e4eb6d40425994eafc26090fed1558afef4194f9223bde34470a4805b396fee7a3ec5b17d43b28b7546b9fa8734fa405046d65bd10dc922fe65c5d7d5342c6e

  • memory/1012-19-0x00000000003F0000-0x00000000003F6000-memory.dmp

    Filesize

    24KB

  • memory/1012-17-0x0000000000500000-0x000000000050E000-memory.dmp

    Filesize

    56KB

  • memory/1012-20-0x00000000003C0000-0x00000000003C6000-memory.dmp

    Filesize

    24KB

  • memory/1012-28-0x0000000000500000-0x000000000050E000-memory.dmp

    Filesize

    56KB

  • memory/2076-13-0x0000000002480000-0x000000000248E000-memory.dmp

    Filesize

    56KB

  • memory/2076-2-0x00000000004A0000-0x00000000004A6000-memory.dmp

    Filesize

    24KB

  • memory/2076-3-0x0000000000320000-0x0000000000326000-memory.dmp

    Filesize

    24KB

  • memory/2076-15-0x0000000000500000-0x000000000050E000-memory.dmp

    Filesize

    56KB

  • memory/2076-1-0x0000000000500000-0x000000000050E000-memory.dmp

    Filesize

    56KB

  • memory/2076-0-0x0000000000320000-0x0000000000326000-memory.dmp

    Filesize

    24KB

  • memory/2076-27-0x0000000002480000-0x000000000248E000-memory.dmp

    Filesize

    56KB