Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
17-09-2023 10:48
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-26_0f4b16be0052e0bab6698d9c9331844f_cryptolocker_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-26_0f4b16be0052e0bab6698d9c9331844f_cryptolocker_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-26_0f4b16be0052e0bab6698d9c9331844f_cryptolocker_JC.exe
-
Size
44KB
-
MD5
0f4b16be0052e0bab6698d9c9331844f
-
SHA1
6ca9b24bef24dfee7266666e279c9e42b1c212f8
-
SHA256
06b3b71920ef29235367f53be7040c9d8455e3d36e40916821709029eabc4619
-
SHA512
e357e2a078cbf53e4a811dfaa71c8d81146d2fd736cb956e50406ebb0b08628b4822391e4ac3eb68ae127bebdad99ff2802329792fb5530b7bfb737a8a4c54ca
-
SSDEEP
768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpjeJQ7suIlsw92KFXckd9d:V6QFElP6n+gMQMOtEvwDpjeJQ7pojakd
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2584 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2832 2023-08-26_0f4b16be0052e0bab6698d9c9331844f_cryptolocker_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2832 wrote to memory of 2584 2832 2023-08-26_0f4b16be0052e0bab6698d9c9331844f_cryptolocker_JC.exe 28 PID 2832 wrote to memory of 2584 2832 2023-08-26_0f4b16be0052e0bab6698d9c9331844f_cryptolocker_JC.exe 28 PID 2832 wrote to memory of 2584 2832 2023-08-26_0f4b16be0052e0bab6698d9c9331844f_cryptolocker_JC.exe 28 PID 2832 wrote to memory of 2584 2832 2023-08-26_0f4b16be0052e0bab6698d9c9331844f_cryptolocker_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-26_0f4b16be0052e0bab6698d9c9331844f_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-26_0f4b16be0052e0bab6698d9c9331844f_cryptolocker_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5f0802b59367aea3b5582e36c7ccffcfb
SHA113502a5f93b041aa22a5ab1803025c4a969cc381
SHA256f939cd3ec83c584bd02d35b57ee4aada3e2cd0727d2cdebcd7b05ba28e67fcde
SHA512e6ecb9d31dc15ddb5378cd0983df735cda87a4005119993b72e98afa86ca897d161a688de59eea2b4f97865a912bd7423a0247ec63430c8f215bb12dbdd3b9e3
-
Filesize
44KB
MD5f0802b59367aea3b5582e36c7ccffcfb
SHA113502a5f93b041aa22a5ab1803025c4a969cc381
SHA256f939cd3ec83c584bd02d35b57ee4aada3e2cd0727d2cdebcd7b05ba28e67fcde
SHA512e6ecb9d31dc15ddb5378cd0983df735cda87a4005119993b72e98afa86ca897d161a688de59eea2b4f97865a912bd7423a0247ec63430c8f215bb12dbdd3b9e3
-
Filesize
44KB
MD5f0802b59367aea3b5582e36c7ccffcfb
SHA113502a5f93b041aa22a5ab1803025c4a969cc381
SHA256f939cd3ec83c584bd02d35b57ee4aada3e2cd0727d2cdebcd7b05ba28e67fcde
SHA512e6ecb9d31dc15ddb5378cd0983df735cda87a4005119993b72e98afa86ca897d161a688de59eea2b4f97865a912bd7423a0247ec63430c8f215bb12dbdd3b9e3