Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 17:45
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-26_5c65576e503af864a15c517b0f4df38f_cryptolocker_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-26_5c65576e503af864a15c517b0f4df38f_cryptolocker_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-26_5c65576e503af864a15c517b0f4df38f_cryptolocker_JC.exe
-
Size
47KB
-
MD5
5c65576e503af864a15c517b0f4df38f
-
SHA1
d49433a7baf69560ae04ee616d6cd6df22ee9ede
-
SHA256
1bc72f7485de821eb5590cc4053c2b19688a3a421b9f9bbb360afff1fe5f8817
-
SHA512
6703492e51fe3432642434d1966bf782df6a566470ee4cea3ee4513ed3f9d2a8918a4a9b64f02289ec41a7974f7731ce223035f0bc3a72f2fe80df9fff0131c4
-
SSDEEP
768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05RKb6FKZ:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKbt
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3000 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2912 2023-08-26_5c65576e503af864a15c517b0f4df38f_cryptolocker_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2912 wrote to memory of 3000 2912 2023-08-26_5c65576e503af864a15c517b0f4df38f_cryptolocker_JC.exe 28 PID 2912 wrote to memory of 3000 2912 2023-08-26_5c65576e503af864a15c517b0f4df38f_cryptolocker_JC.exe 28 PID 2912 wrote to memory of 3000 2912 2023-08-26_5c65576e503af864a15c517b0f4df38f_cryptolocker_JC.exe 28 PID 2912 wrote to memory of 3000 2912 2023-08-26_5c65576e503af864a15c517b0f4df38f_cryptolocker_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-26_5c65576e503af864a15c517b0f4df38f_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-26_5c65576e503af864a15c517b0f4df38f_cryptolocker_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD536b35625ee1cfa2a12d12d37372659d9
SHA11bc4d1e2137d75050e9ac7d9b66f0ee5460303fc
SHA256ca779eaf3c826849d6eec8c0d29e379069a5073c790a51cfaaa81f1237746c74
SHA512324624771ab22e5d32a27a9d3b0953002860a6ecc643cb9ca689837bab087cfd8f4d2f12c5ee34466a41d6d47df731b4296a59e1f28d9895b24b40269c41a1aa
-
Filesize
48KB
MD536b35625ee1cfa2a12d12d37372659d9
SHA11bc4d1e2137d75050e9ac7d9b66f0ee5460303fc
SHA256ca779eaf3c826849d6eec8c0d29e379069a5073c790a51cfaaa81f1237746c74
SHA512324624771ab22e5d32a27a9d3b0953002860a6ecc643cb9ca689837bab087cfd8f4d2f12c5ee34466a41d6d47df731b4296a59e1f28d9895b24b40269c41a1aa
-
Filesize
48KB
MD536b35625ee1cfa2a12d12d37372659d9
SHA11bc4d1e2137d75050e9ac7d9b66f0ee5460303fc
SHA256ca779eaf3c826849d6eec8c0d29e379069a5073c790a51cfaaa81f1237746c74
SHA512324624771ab22e5d32a27a9d3b0953002860a6ecc643cb9ca689837bab087cfd8f4d2f12c5ee34466a41d6d47df731b4296a59e1f28d9895b24b40269c41a1aa