Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    30-08-2023 18:32

General

  • Target

    ea1d746d371a5c6c1222ac42bef250a1_cryptolocker_JC.exe

  • Size

    31KB

  • MD5

    ea1d746d371a5c6c1222ac42bef250a1

  • SHA1

    61d30f25e097ddc9885fe39018b081c9f0bce251

  • SHA256

    47069a3bbbd8520e44113ff5947788eda906d8915a41f9591aa36a9a88a4db63

  • SHA512

    51c82b001ff1ad7ffa1ce96167c184560efa115c704f51f291a671e7269dafc6bc6c3ae6a7b6dd5c9456dc3123a138d93ae581f1daded3f7d36c074a5f44a446

  • SSDEEP

    384:bA74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUZ0psObGqWB5uKh:bA74zYcgT/Ekd0ryfjeRtBMA

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea1d746d371a5c6c1222ac42bef250a1_cryptolocker_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\ea1d746d371a5c6c1222ac42bef250a1_cryptolocker_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2572
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:1340

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    31KB

    MD5

    069ce2df2d96147b8ddb2aa93a5ce597

    SHA1

    3a2a83dc05cd1d3055833dc916dd854689dc7740

    SHA256

    eff1aef89ccfd6f73531342e5d19879f6810ff22d5a58151d8e4f353ccd0760b

    SHA512

    8ad497ff46d660c6120f43b423be164976f46f77b91ef48d6e5b9652d7ecbe0b24ca3dd826a782b5b891a3e5aa3207b59844a8e9474113191cbbe8337e8aaaab

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    31KB

    MD5

    069ce2df2d96147b8ddb2aa93a5ce597

    SHA1

    3a2a83dc05cd1d3055833dc916dd854689dc7740

    SHA256

    eff1aef89ccfd6f73531342e5d19879f6810ff22d5a58151d8e4f353ccd0760b

    SHA512

    8ad497ff46d660c6120f43b423be164976f46f77b91ef48d6e5b9652d7ecbe0b24ca3dd826a782b5b891a3e5aa3207b59844a8e9474113191cbbe8337e8aaaab

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    31KB

    MD5

    069ce2df2d96147b8ddb2aa93a5ce597

    SHA1

    3a2a83dc05cd1d3055833dc916dd854689dc7740

    SHA256

    eff1aef89ccfd6f73531342e5d19879f6810ff22d5a58151d8e4f353ccd0760b

    SHA512

    8ad497ff46d660c6120f43b423be164976f46f77b91ef48d6e5b9652d7ecbe0b24ca3dd826a782b5b891a3e5aa3207b59844a8e9474113191cbbe8337e8aaaab

  • memory/1340-16-0x0000000000470000-0x0000000000476000-memory.dmp

    Filesize

    24KB

  • memory/1340-15-0x0000000000450000-0x0000000000456000-memory.dmp

    Filesize

    24KB

  • memory/2572-0-0x0000000000200000-0x0000000000206000-memory.dmp

    Filesize

    24KB

  • memory/2572-2-0x00000000002A0000-0x00000000002A6000-memory.dmp

    Filesize

    24KB

  • memory/2572-1-0x0000000000200000-0x0000000000206000-memory.dmp

    Filesize

    24KB