Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
23-10-2023 19:19
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-05_68081183dea2f65059caa2923f0b37e5_cryptolocker_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.2023-09-05_68081183dea2f65059caa2923f0b37e5_cryptolocker_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.2023-09-05_68081183dea2f65059caa2923f0b37e5_cryptolocker_JC.exe
-
Size
40KB
-
MD5
68081183dea2f65059caa2923f0b37e5
-
SHA1
58be0ae4f8cc54ce52050d7e87e132d7c9e778e1
-
SHA256
5a8070f6df31ce40b7e73c3d4ce7f58b753cec82eff32db8e89151dd59c541d3
-
SHA512
b87af260b62db9c106769979f908e522749176d38472ecb3fd8b9cfc2b8130263cb731aaca46561e4e4e7d62e18f17bbd2d242b41c9ffd53e7982e421b47ea1e
-
SSDEEP
768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37YR8C:bgGYcA/53GAA6y37UH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2312 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 1164 NEAS.2023-09-05_68081183dea2f65059caa2923f0b37e5_cryptolocker_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1164 wrote to memory of 2312 1164 NEAS.2023-09-05_68081183dea2f65059caa2923f0b37e5_cryptolocker_JC.exe 28 PID 1164 wrote to memory of 2312 1164 NEAS.2023-09-05_68081183dea2f65059caa2923f0b37e5_cryptolocker_JC.exe 28 PID 1164 wrote to memory of 2312 1164 NEAS.2023-09-05_68081183dea2f65059caa2923f0b37e5_cryptolocker_JC.exe 28 PID 1164 wrote to memory of 2312 1164 NEAS.2023-09-05_68081183dea2f65059caa2923f0b37e5_cryptolocker_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-05_68081183dea2f65059caa2923f0b37e5_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-05_68081183dea2f65059caa2923f0b37e5_cryptolocker_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5fe876b43f669637a5cb7ff83f4c8a7d0
SHA15e7f4d15341bdb7f7c78cba4a2dcb2eddd0c59d9
SHA256610933da0906f0b0b73704f26c212d441b53dca6b62e2cc5742de9f922a6cc7d
SHA512957372caf1f2f4659e2e4b298db19bc641a87d15af967f359045bedc70d0924f705816abdb71dd1de7bf22a8ffe2c498b2d718ede84dbbe118f33d9063243297
-
Filesize
41KB
MD5fe876b43f669637a5cb7ff83f4c8a7d0
SHA15e7f4d15341bdb7f7c78cba4a2dcb2eddd0c59d9
SHA256610933da0906f0b0b73704f26c212d441b53dca6b62e2cc5742de9f922a6cc7d
SHA512957372caf1f2f4659e2e4b298db19bc641a87d15af967f359045bedc70d0924f705816abdb71dd1de7bf22a8ffe2c498b2d718ede84dbbe118f33d9063243297
-
Filesize
41KB
MD5fe876b43f669637a5cb7ff83f4c8a7d0
SHA15e7f4d15341bdb7f7c78cba4a2dcb2eddd0c59d9
SHA256610933da0906f0b0b73704f26c212d441b53dca6b62e2cc5742de9f922a6cc7d
SHA512957372caf1f2f4659e2e4b298db19bc641a87d15af967f359045bedc70d0924f705816abdb71dd1de7bf22a8ffe2c498b2d718ede84dbbe118f33d9063243297