Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
29-09-2023 19:52
Behavioral task
behavioral1
Sample
2023-08-26_d47776c01cbf23f7b68a615f7a2dc281_cryptolocker_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-26_d47776c01cbf23f7b68a615f7a2dc281_cryptolocker_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-26_d47776c01cbf23f7b68a615f7a2dc281_cryptolocker_JC.exe
-
Size
114KB
-
MD5
d47776c01cbf23f7b68a615f7a2dc281
-
SHA1
438fe56034ebb3b418d49b1fd100dac0afc073b1
-
SHA256
c9754ac4bcdbec7b04a17066ec31f17b03664e02077399dec19f4ab262954a61
-
SHA512
2cde68f4a3f837f770c9d1fe2d67fbfd8732cd52eda6193dcc27fbaeaa576f5a8de45bc4a5870b0fc296594935c272eca8a6e87815f961f2db6ec513d871ee6c
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNgerar/7:T6a+rdOOtEvwDpjLzm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1908 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2260 2023-08-26_d47776c01cbf23f7b68a615f7a2dc281_cryptolocker_JC.exe -
resource yara_rule behavioral1/memory/2260-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000f000000012002-11.dat upx behavioral1/files/0x000f000000012002-14.dat upx behavioral1/memory/2260-15-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/1908-16-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000f000000012002-25.dat upx behavioral1/memory/1908-26-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2260 wrote to memory of 1908 2260 2023-08-26_d47776c01cbf23f7b68a615f7a2dc281_cryptolocker_JC.exe 28 PID 2260 wrote to memory of 1908 2260 2023-08-26_d47776c01cbf23f7b68a615f7a2dc281_cryptolocker_JC.exe 28 PID 2260 wrote to memory of 1908 2260 2023-08-26_d47776c01cbf23f7b68a615f7a2dc281_cryptolocker_JC.exe 28 PID 2260 wrote to memory of 1908 2260 2023-08-26_d47776c01cbf23f7b68a615f7a2dc281_cryptolocker_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-26_d47776c01cbf23f7b68a615f7a2dc281_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-26_d47776c01cbf23f7b68a615f7a2dc281_cryptolocker_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:1908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114KB
MD5a16451a62e49711dd6150c3b7b0aa5fe
SHA1d28be11fecb59f2bbe0f249bc2800dd376dc52a7
SHA2566905aabb8a95bb9c852eec350996796364c7726c3b265bf4bfc7a3b869eafa65
SHA512589397f4deb8ee828ec3f2f78b2bb58ae1ac0d8fc222f1b9cc546526a9c6f407caa8200de5c97d3ecaa3f7769d0a2ec579c58e3742e156026f828874dbcfd5e1
-
Filesize
114KB
MD5a16451a62e49711dd6150c3b7b0aa5fe
SHA1d28be11fecb59f2bbe0f249bc2800dd376dc52a7
SHA2566905aabb8a95bb9c852eec350996796364c7726c3b265bf4bfc7a3b869eafa65
SHA512589397f4deb8ee828ec3f2f78b2bb58ae1ac0d8fc222f1b9cc546526a9c6f407caa8200de5c97d3ecaa3f7769d0a2ec579c58e3742e156026f828874dbcfd5e1
-
Filesize
114KB
MD5a16451a62e49711dd6150c3b7b0aa5fe
SHA1d28be11fecb59f2bbe0f249bc2800dd376dc52a7
SHA2566905aabb8a95bb9c852eec350996796364c7726c3b265bf4bfc7a3b869eafa65
SHA512589397f4deb8ee828ec3f2f78b2bb58ae1ac0d8fc222f1b9cc546526a9c6f407caa8200de5c97d3ecaa3f7769d0a2ec579c58e3742e156026f828874dbcfd5e1