Analysis

  • max time kernel
    141s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    23/10/2023, 20:25

General

  • Target

    NEAS.2023-09-04_6e79b83c3d13747c99711f76064eb5f7_cryptolocker_JC.exe

  • Size

    41KB

  • MD5

    6e79b83c3d13747c99711f76064eb5f7

  • SHA1

    d3d5c788c53faa77c57fbdc28f405dbd44bc8ad4

  • SHA256

    4ac2dcf63f99445d6783017adc739c56c3a548121166435be37b71d32babfd99

  • SHA512

    0d1b3a8c723ec16cbe7e0a4cacb9d0b7c300359146638334c30c7f90811b95f504ed176dedd62993b087afaaaf9a85d5219ea79cb61ef47626a516b5b59303c2

  • SSDEEP

    768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37YbNz:bgGYcA/53GAA6y37ez

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-04_6e79b83c3d13747c99711f76064eb5f7_cryptolocker_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-04_6e79b83c3d13747c99711f76064eb5f7_cryptolocker_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1060
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    41KB

    MD5

    d5068ec71cb7878b3a7a77fb43e6ba8f

    SHA1

    c7544a99e71391fee97506aae8ecfda3f5689bac

    SHA256

    7646c718b103c313538fb90cd1f47c28da8818a2a5ee4252bc9ad8584b422b28

    SHA512

    aa2dd4a2b62acda72422b4aef5c73f6f932600d5f69ffe13a216bf91a3ea0a3ca0341707cea4d8de971e036d8007ee7e8a49c59d6e222863e8dc8defc531b343

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    41KB

    MD5

    d5068ec71cb7878b3a7a77fb43e6ba8f

    SHA1

    c7544a99e71391fee97506aae8ecfda3f5689bac

    SHA256

    7646c718b103c313538fb90cd1f47c28da8818a2a5ee4252bc9ad8584b422b28

    SHA512

    aa2dd4a2b62acda72422b4aef5c73f6f932600d5f69ffe13a216bf91a3ea0a3ca0341707cea4d8de971e036d8007ee7e8a49c59d6e222863e8dc8defc531b343

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    41KB

    MD5

    d5068ec71cb7878b3a7a77fb43e6ba8f

    SHA1

    c7544a99e71391fee97506aae8ecfda3f5689bac

    SHA256

    7646c718b103c313538fb90cd1f47c28da8818a2a5ee4252bc9ad8584b422b28

    SHA512

    aa2dd4a2b62acda72422b4aef5c73f6f932600d5f69ffe13a216bf91a3ea0a3ca0341707cea4d8de971e036d8007ee7e8a49c59d6e222863e8dc8defc531b343

  • memory/1060-0-0x0000000000210000-0x0000000000216000-memory.dmp

    Filesize

    24KB

  • memory/1060-1-0x0000000000210000-0x0000000000216000-memory.dmp

    Filesize

    24KB

  • memory/1060-2-0x00000000002B0000-0x00000000002B6000-memory.dmp

    Filesize

    24KB

  • memory/2656-16-0x0000000000570000-0x0000000000576000-memory.dmp

    Filesize

    24KB

  • memory/2656-15-0x0000000000550000-0x0000000000556000-memory.dmp

    Filesize

    24KB