Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
02/10/2023, 20:20
Behavioral task
behavioral1
Sample
2023-08-27_665f8175a73d7bb1a4ec523fe0f33982_cryptolocker_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-27_665f8175a73d7bb1a4ec523fe0f33982_cryptolocker_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-27_665f8175a73d7bb1a4ec523fe0f33982_cryptolocker_JC.exe
-
Size
67KB
-
MD5
665f8175a73d7bb1a4ec523fe0f33982
-
SHA1
405e6502be531a0e81b7d463e3a467aaace102b3
-
SHA256
0a54e20eec22278515036fdc4f3d95b60f13730d47d4340dcca137af87a42b60
-
SHA512
f08e3e17e6f4c82145763a3406fc274d6c650c8f109549506227568c9361d434772d3651a561d359cb828eacaa6a9abf7fe5ba8fb4fb0b836d8156986cb79d5a
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsal+:1nK6a+qdOOtEvwDpjz
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2656 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2808 2023-08-27_665f8175a73d7bb1a4ec523fe0f33982_cryptolocker_JC.exe -
resource yara_rule behavioral1/memory/2808-0-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral1/files/0x00070000000120e4-11.dat upx behavioral1/memory/2808-13-0x0000000002800000-0x0000000002810000-memory.dmp upx behavioral1/files/0x00070000000120e4-16.dat upx behavioral1/memory/2808-15-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral1/memory/2656-17-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral1/files/0x00070000000120e4-25.dat upx behavioral1/memory/2656-26-0x0000000000500000-0x000000000050F311-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2808 wrote to memory of 2656 2808 2023-08-27_665f8175a73d7bb1a4ec523fe0f33982_cryptolocker_JC.exe 28 PID 2808 wrote to memory of 2656 2808 2023-08-27_665f8175a73d7bb1a4ec523fe0f33982_cryptolocker_JC.exe 28 PID 2808 wrote to memory of 2656 2808 2023-08-27_665f8175a73d7bb1a4ec523fe0f33982_cryptolocker_JC.exe 28 PID 2808 wrote to memory of 2656 2808 2023-08-27_665f8175a73d7bb1a4ec523fe0f33982_cryptolocker_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-27_665f8175a73d7bb1a4ec523fe0f33982_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-27_665f8175a73d7bb1a4ec523fe0f33982_cryptolocker_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD54db6853ea4fe1244974b62ec814719f3
SHA126a6bf51367fdefd9d1bf856e52b741bf507487f
SHA256e26c1432fb772a82d88a2cb3665b26c24db07f968d471d6546b27c9a79d563ce
SHA512d8fcc7a019462b22b6355a935bc58c7eeee75bd38085b0193d985804cbd111690932df50b9f21fc0bfc92d3222b3521adb880503378bc7844fcea1cb12820a9e
-
Filesize
67KB
MD54db6853ea4fe1244974b62ec814719f3
SHA126a6bf51367fdefd9d1bf856e52b741bf507487f
SHA256e26c1432fb772a82d88a2cb3665b26c24db07f968d471d6546b27c9a79d563ce
SHA512d8fcc7a019462b22b6355a935bc58c7eeee75bd38085b0193d985804cbd111690932df50b9f21fc0bfc92d3222b3521adb880503378bc7844fcea1cb12820a9e
-
Filesize
67KB
MD54db6853ea4fe1244974b62ec814719f3
SHA126a6bf51367fdefd9d1bf856e52b741bf507487f
SHA256e26c1432fb772a82d88a2cb3665b26c24db07f968d471d6546b27c9a79d563ce
SHA512d8fcc7a019462b22b6355a935bc58c7eeee75bd38085b0193d985804cbd111690932df50b9f21fc0bfc92d3222b3521adb880503378bc7844fcea1cb12820a9e