Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 20:44
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-25_e37cfcbd8604ee63247e12b05c0df5fe_cryptolocker_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-25_e37cfcbd8604ee63247e12b05c0df5fe_cryptolocker_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-25_e37cfcbd8604ee63247e12b05c0df5fe_cryptolocker_JC.exe
-
Size
75KB
-
MD5
e37cfcbd8604ee63247e12b05c0df5fe
-
SHA1
6add963a2b58ffc0ec392cc2025e7a07f0bc81c2
-
SHA256
91e7214afaf87009ab4b2b136c3fd6017cec580ed44fae084c39496bc51e83fb
-
SHA512
e7f98d8100f9dfa2ce69f643537bb0f8f36c7209a5bb0cf9a62b73023c130ce72e870fcf5e1931f7b8d8cf06bb044d63888dc4579cbc01ef06682316ef55f3f2
-
SSDEEP
1536:vj+jsMQMOtEvwDpj5HwYYTjipvF2hBfWa1:vCjsIOtEvwDpj5H9YvQd2Z
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2212 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2260 2023-08-25_e37cfcbd8604ee63247e12b05c0df5fe_cryptolocker_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2212 2260 2023-08-25_e37cfcbd8604ee63247e12b05c0df5fe_cryptolocker_JC.exe 28 PID 2260 wrote to memory of 2212 2260 2023-08-25_e37cfcbd8604ee63247e12b05c0df5fe_cryptolocker_JC.exe 28 PID 2260 wrote to memory of 2212 2260 2023-08-25_e37cfcbd8604ee63247e12b05c0df5fe_cryptolocker_JC.exe 28 PID 2260 wrote to memory of 2212 2260 2023-08-25_e37cfcbd8604ee63247e12b05c0df5fe_cryptolocker_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-25_e37cfcbd8604ee63247e12b05c0df5fe_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-25_e37cfcbd8604ee63247e12b05c0df5fe_cryptolocker_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
75KB
MD5a6ce1217f6e7fb8420d1168d35226445
SHA11912b2446b37513e20e1a27bfeae5eeefc37b225
SHA256c934c89867b1a2a343b8714327d208ca925ee7bb7cbe48f44fb8f33283f7597c
SHA51222b46d0715419e86e93d01aafd7e2dba4353cadf89a3a741a9780e953620c9f9e19c2c511ebbd17bc027d69a60d9310b650c3906314ed1e04246baa700ec71cb
-
Filesize
75KB
MD5a6ce1217f6e7fb8420d1168d35226445
SHA11912b2446b37513e20e1a27bfeae5eeefc37b225
SHA256c934c89867b1a2a343b8714327d208ca925ee7bb7cbe48f44fb8f33283f7597c
SHA51222b46d0715419e86e93d01aafd7e2dba4353cadf89a3a741a9780e953620c9f9e19c2c511ebbd17bc027d69a60d9310b650c3906314ed1e04246baa700ec71cb
-
Filesize
75KB
MD5a6ce1217f6e7fb8420d1168d35226445
SHA11912b2446b37513e20e1a27bfeae5eeefc37b225
SHA256c934c89867b1a2a343b8714327d208ca925ee7bb7cbe48f44fb8f33283f7597c
SHA51222b46d0715419e86e93d01aafd7e2dba4353cadf89a3a741a9780e953620c9f9e19c2c511ebbd17bc027d69a60d9310b650c3906314ed1e04246baa700ec71cb