Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
31/10/2023, 23:03
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-08_f45cd5071ef5d90b72e8a5cfa793d49b_cryptolocker_JC.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.2023-09-08_f45cd5071ef5d90b72e8a5cfa793d49b_cryptolocker_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.2023-09-08_f45cd5071ef5d90b72e8a5cfa793d49b_cryptolocker_JC.exe
-
Size
88KB
-
MD5
f45cd5071ef5d90b72e8a5cfa793d49b
-
SHA1
8ef225a043cb93677d5191f1860e3378e275aaed
-
SHA256
8ccbf1d23f623bf98616bfa252138d572dfa2eab0cdcae8f651578be3e735d8a
-
SHA512
0c65e10d8d30f2bfa5c22c5befa6ebd4805e7ee0796018a97d639e0a73338ca4767aa2006113ed6fd50bc9dcc6ba01ca819329fdff634ef00c36b5bf14d94f7b
-
SSDEEP
1536:V6QFElP6n+gMQMOtEvwDpjQGYQbNcqamvWHShl/3k:V6a+pOtEvwDpjtW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2412 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 3068 NEAS.2023-09-08_f45cd5071ef5d90b72e8a5cfa793d49b_cryptolocker_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2412 3068 NEAS.2023-09-08_f45cd5071ef5d90b72e8a5cfa793d49b_cryptolocker_JC.exe 28 PID 3068 wrote to memory of 2412 3068 NEAS.2023-09-08_f45cd5071ef5d90b72e8a5cfa793d49b_cryptolocker_JC.exe 28 PID 3068 wrote to memory of 2412 3068 NEAS.2023-09-08_f45cd5071ef5d90b72e8a5cfa793d49b_cryptolocker_JC.exe 28 PID 3068 wrote to memory of 2412 3068 NEAS.2023-09-08_f45cd5071ef5d90b72e8a5cfa793d49b_cryptolocker_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-08_f45cd5071ef5d90b72e8a5cfa793d49b_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-08_f45cd5071ef5d90b72e8a5cfa793d49b_cryptolocker_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD5887caa8f3b0ccb54820538367ab0efb4
SHA16e941264d5baee624db534b4e4999c7b55cf71e4
SHA256cea30f74d746475f1f0daa243626dc83aa77cbde8b0ce1d939751ee35a2b6e64
SHA51218a1ef751615bc6ba30ee19a246a12b69ae73bf5fa57d9d55f7e4d48042b92bbfad7816a826244b54209c71407b6cc609efab3bfb3f253116f4ec95c91b25829
-
Filesize
89KB
MD5887caa8f3b0ccb54820538367ab0efb4
SHA16e941264d5baee624db534b4e4999c7b55cf71e4
SHA256cea30f74d746475f1f0daa243626dc83aa77cbde8b0ce1d939751ee35a2b6e64
SHA51218a1ef751615bc6ba30ee19a246a12b69ae73bf5fa57d9d55f7e4d48042b92bbfad7816a826244b54209c71407b6cc609efab3bfb3f253116f4ec95c91b25829
-
Filesize
89KB
MD5887caa8f3b0ccb54820538367ab0efb4
SHA16e941264d5baee624db534b4e4999c7b55cf71e4
SHA256cea30f74d746475f1f0daa243626dc83aa77cbde8b0ce1d939751ee35a2b6e64
SHA51218a1ef751615bc6ba30ee19a246a12b69ae73bf5fa57d9d55f7e4d48042b92bbfad7816a826244b54209c71407b6cc609efab3bfb3f253116f4ec95c91b25829