Analysis

  • max time kernel
    151s
  • max time network
    179s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 01:32

General

  • Target

    2023-08-26_3df684c4bed2ce014837a982a7812925_cryptolocker_JC.exe

  • Size

    35KB

  • MD5

    3df684c4bed2ce014837a982a7812925

  • SHA1

    a83e45b9d7d001415f8497672edfb8cb05e464e7

  • SHA256

    4c9eca88a5d36333b64c2851d603ea31878adb39caa84668818efed4e7779a87

  • SHA512

    5ccab6c7d28a6922228bc8efff56ad7f7ccbfac006adfe5f64951ca609b84e6dc3f5cdac028f2837c0746e899152da3b62e3d2762f088e8c7a1de54a84f6541d

  • SSDEEP

    384:bgX4uGLLQRcsdeQ7/nQu63Ag7YmecFanrlwfjDUkKDfWf0w3sp8kpc0ftW:bgX4zYcgTEu6QOaryfjqDDw3sCOfg

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2023-08-26_3df684c4bed2ce014837a982a7812925_cryptolocker_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\2023-08-26_3df684c4bed2ce014837a982a7812925_cryptolocker_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1516
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    35KB

    MD5

    4a99956d790b2db7199bc5a5d711c813

    SHA1

    e3ac9a39119408d939f0d332427020bf3e02b3f3

    SHA256

    4c79086f28bcd283bc4df9bd49d280b831d533af578719467a0f30fc0d7caae2

    SHA512

    1c1db9006d8f55960dde9e3bbbfb5a88ae55b8150eb93dcdcc2945cae90e2f2e7a1ba9c3606f04beaf6168eef7fa810d8c93f383afa980916577fbecb6cdb489

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    35KB

    MD5

    4a99956d790b2db7199bc5a5d711c813

    SHA1

    e3ac9a39119408d939f0d332427020bf3e02b3f3

    SHA256

    4c79086f28bcd283bc4df9bd49d280b831d533af578719467a0f30fc0d7caae2

    SHA512

    1c1db9006d8f55960dde9e3bbbfb5a88ae55b8150eb93dcdcc2945cae90e2f2e7a1ba9c3606f04beaf6168eef7fa810d8c93f383afa980916577fbecb6cdb489

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    35KB

    MD5

    4a99956d790b2db7199bc5a5d711c813

    SHA1

    e3ac9a39119408d939f0d332427020bf3e02b3f3

    SHA256

    4c79086f28bcd283bc4df9bd49d280b831d533af578719467a0f30fc0d7caae2

    SHA512

    1c1db9006d8f55960dde9e3bbbfb5a88ae55b8150eb93dcdcc2945cae90e2f2e7a1ba9c3606f04beaf6168eef7fa810d8c93f383afa980916577fbecb6cdb489

  • memory/1516-0-0x0000000000300000-0x0000000000306000-memory.dmp

    Filesize

    24KB

  • memory/1516-2-0x0000000000300000-0x0000000000306000-memory.dmp

    Filesize

    24KB

  • memory/1516-1-0x0000000000320000-0x0000000000326000-memory.dmp

    Filesize

    24KB

  • memory/2756-16-0x0000000001CA0000-0x0000000001CA6000-memory.dmp

    Filesize

    24KB

  • memory/2756-15-0x0000000001C80000-0x0000000001C86000-memory.dmp

    Filesize

    24KB