Analysis
-
max time kernel
151s -
max time network
179s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 01:32
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-26_3df684c4bed2ce014837a982a7812925_cryptolocker_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-26_3df684c4bed2ce014837a982a7812925_cryptolocker_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-26_3df684c4bed2ce014837a982a7812925_cryptolocker_JC.exe
-
Size
35KB
-
MD5
3df684c4bed2ce014837a982a7812925
-
SHA1
a83e45b9d7d001415f8497672edfb8cb05e464e7
-
SHA256
4c9eca88a5d36333b64c2851d603ea31878adb39caa84668818efed4e7779a87
-
SHA512
5ccab6c7d28a6922228bc8efff56ad7f7ccbfac006adfe5f64951ca609b84e6dc3f5cdac028f2837c0746e899152da3b62e3d2762f088e8c7a1de54a84f6541d
-
SSDEEP
384:bgX4uGLLQRcsdeQ7/nQu63Ag7YmecFanrlwfjDUkKDfWf0w3sp8kpc0ftW:bgX4zYcgTEu6QOaryfjqDDw3sCOfg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2756 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 1516 2023-08-26_3df684c4bed2ce014837a982a7812925_cryptolocker_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1516 wrote to memory of 2756 1516 2023-08-26_3df684c4bed2ce014837a982a7812925_cryptolocker_JC.exe 28 PID 1516 wrote to memory of 2756 1516 2023-08-26_3df684c4bed2ce014837a982a7812925_cryptolocker_JC.exe 28 PID 1516 wrote to memory of 2756 1516 2023-08-26_3df684c4bed2ce014837a982a7812925_cryptolocker_JC.exe 28 PID 1516 wrote to memory of 2756 1516 2023-08-26_3df684c4bed2ce014837a982a7812925_cryptolocker_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-26_3df684c4bed2ce014837a982a7812925_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-26_3df684c4bed2ce014837a982a7812925_cryptolocker_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD54a99956d790b2db7199bc5a5d711c813
SHA1e3ac9a39119408d939f0d332427020bf3e02b3f3
SHA2564c79086f28bcd283bc4df9bd49d280b831d533af578719467a0f30fc0d7caae2
SHA5121c1db9006d8f55960dde9e3bbbfb5a88ae55b8150eb93dcdcc2945cae90e2f2e7a1ba9c3606f04beaf6168eef7fa810d8c93f383afa980916577fbecb6cdb489
-
Filesize
35KB
MD54a99956d790b2db7199bc5a5d711c813
SHA1e3ac9a39119408d939f0d332427020bf3e02b3f3
SHA2564c79086f28bcd283bc4df9bd49d280b831d533af578719467a0f30fc0d7caae2
SHA5121c1db9006d8f55960dde9e3bbbfb5a88ae55b8150eb93dcdcc2945cae90e2f2e7a1ba9c3606f04beaf6168eef7fa810d8c93f383afa980916577fbecb6cdb489
-
Filesize
35KB
MD54a99956d790b2db7199bc5a5d711c813
SHA1e3ac9a39119408d939f0d332427020bf3e02b3f3
SHA2564c79086f28bcd283bc4df9bd49d280b831d533af578719467a0f30fc0d7caae2
SHA5121c1db9006d8f55960dde9e3bbbfb5a88ae55b8150eb93dcdcc2945cae90e2f2e7a1ba9c3606f04beaf6168eef7fa810d8c93f383afa980916577fbecb6cdb489