Analysis

  • max time kernel
    142s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/08/2023, 15:50

General

  • Target

    bcb0858e0833732b23830524409ff239_cryptolocker_JC.exe

  • Size

    76KB

  • MD5

    bcb0858e0833732b23830524409ff239

  • SHA1

    2ccba903e0f58f53831a9fecde8057ec858ef1c5

  • SHA256

    feb08b2065bcd6efa4ec82e04dcaefd31992e80b6d9323273341296f219500ad

  • SHA512

    e040b517b4140ddf28fd0525f621d53e2e200fedd2726c68985d374128bf934fa4350b9f6efc68c56367f902da9c87d52af09b8a2f72b39bfdfd9a231c9e173f

  • SSDEEP

    1536:Tj+jsMQMOtEvwDpj5HmpJpOUHECgNMo0vp2EMMF:TCjsIOtEvwDpj5HE/OUHnSM7

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bcb0858e0833732b23830524409ff239_cryptolocker_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\bcb0858e0833732b23830524409ff239_cryptolocker_JC.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4220
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:1940

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\misid.exe

          Filesize

          76KB

          MD5

          d57080d600a68b014e065c00c5413929

          SHA1

          98db644c6353506bcbacf4f1ebb95a03fbcf6bde

          SHA256

          e59294479060bcb7ca201d642250d0f92ee5681d1f1ada0641753d432530e2e2

          SHA512

          4e4eb6d40425994eafc26090fed1558afef4194f9223bde34470a4805b396fee7a3ec5b17d43b28b7546b9fa8734fa405046d65bd10dc922fe65c5d7d5342c6e

        • C:\Users\Admin\AppData\Local\Temp\misid.exe

          Filesize

          76KB

          MD5

          d57080d600a68b014e065c00c5413929

          SHA1

          98db644c6353506bcbacf4f1ebb95a03fbcf6bde

          SHA256

          e59294479060bcb7ca201d642250d0f92ee5681d1f1ada0641753d432530e2e2

          SHA512

          4e4eb6d40425994eafc26090fed1558afef4194f9223bde34470a4805b396fee7a3ec5b17d43b28b7546b9fa8734fa405046d65bd10dc922fe65c5d7d5342c6e

        • C:\Users\Admin\AppData\Local\Temp\misid.exe

          Filesize

          76KB

          MD5

          d57080d600a68b014e065c00c5413929

          SHA1

          98db644c6353506bcbacf4f1ebb95a03fbcf6bde

          SHA256

          e59294479060bcb7ca201d642250d0f92ee5681d1f1ada0641753d432530e2e2

          SHA512

          4e4eb6d40425994eafc26090fed1558afef4194f9223bde34470a4805b396fee7a3ec5b17d43b28b7546b9fa8734fa405046d65bd10dc922fe65c5d7d5342c6e

        • C:\Users\Admin\AppData\Local\Temp\misids.exe

          Filesize

          315B

          MD5

          a34ac19f4afae63adc5d2f7bc970c07f

          SHA1

          a82190fc530c265aa40a045c21770d967f4767b8

          SHA256

          d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3

          SHA512

          42e53d96e5961e95b7a984d9c9778a1d3bd8ee0c87b8b3b515fa31f67c2d073c8565afc2f4b962c43668c4efa1e478da9bb0ecffa79479c7e880731bc4c55765

        • memory/1940-19-0x00000000005A0000-0x00000000005A6000-memory.dmp

          Filesize

          24KB

        • memory/1940-20-0x00000000005D0000-0x00000000005D6000-memory.dmp

          Filesize

          24KB

        • memory/1940-46-0x0000000000500000-0x000000000050E000-memory.dmp

          Filesize

          56KB

        • memory/4220-0-0x0000000000500000-0x000000000050E000-memory.dmp

          Filesize

          56KB

        • memory/4220-1-0x00000000006B0000-0x00000000006B6000-memory.dmp

          Filesize

          24KB

        • memory/4220-2-0x00000000006B0000-0x00000000006B6000-memory.dmp

          Filesize

          24KB

        • memory/4220-3-0x0000000000820000-0x0000000000826000-memory.dmp

          Filesize

          24KB

        • memory/4220-16-0x0000000000500000-0x000000000050E000-memory.dmp

          Filesize

          56KB