Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
05/11/2023, 15:44
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-28_d857b27439215fb637a824345b2fba91_cryptolocker_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.2023-09-28_d857b27439215fb637a824345b2fba91_cryptolocker_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.2023-09-28_d857b27439215fb637a824345b2fba91_cryptolocker_JC.exe
-
Size
102KB
-
MD5
d857b27439215fb637a824345b2fba91
-
SHA1
2a00042d8448b8886531689d8bd6941bea3f93d7
-
SHA256
bb8822ed1dd1a946e50aed1986e467027188838420185832fac2359bb59f3497
-
SHA512
e8671838bb97c88f0c74e51a61bc86d2fe9bfa543bcd12845635eca83047a1fb68d9868263fe87a6d30d4b326bc42cb6468a979ac5035bd2128abffb7e129dc0
-
SSDEEP
768:xQz7yVEhs9+4uR1bytOOtEvwDpjWfbZ7uyA36S7MpxRiWjyH:xj+VGMOtEvwDpjubwQEIikw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1876 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2880 NEAS.2023-09-28_d857b27439215fb637a824345b2fba91_cryptolocker_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2880 wrote to memory of 1876 2880 NEAS.2023-09-28_d857b27439215fb637a824345b2fba91_cryptolocker_JC.exe 28 PID 2880 wrote to memory of 1876 2880 NEAS.2023-09-28_d857b27439215fb637a824345b2fba91_cryptolocker_JC.exe 28 PID 2880 wrote to memory of 1876 2880 NEAS.2023-09-28_d857b27439215fb637a824345b2fba91_cryptolocker_JC.exe 28 PID 2880 wrote to memory of 1876 2880 NEAS.2023-09-28_d857b27439215fb637a824345b2fba91_cryptolocker_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-28_d857b27439215fb637a824345b2fba91_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-28_d857b27439215fb637a824345b2fba91_cryptolocker_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:1876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102KB
MD56d20a592fefab13838c678b0fffcd119
SHA13289cdded1a5f3178d8f75f33963ac510fa37317
SHA2567c5845575e0733422adf98a7f23e0912c0a954a991031bdec088ccfbf687e64e
SHA51210847fcf571de203336e86ad0055f16132aa508a73855abe2abafea6a1446fd1a0255492c201a7c00e071504daf47673e84676f88069bc701ffee7ae043e0add
-
Filesize
102KB
MD56d20a592fefab13838c678b0fffcd119
SHA13289cdded1a5f3178d8f75f33963ac510fa37317
SHA2567c5845575e0733422adf98a7f23e0912c0a954a991031bdec088ccfbf687e64e
SHA51210847fcf571de203336e86ad0055f16132aa508a73855abe2abafea6a1446fd1a0255492c201a7c00e071504daf47673e84676f88069bc701ffee7ae043e0add
-
Filesize
102KB
MD56d20a592fefab13838c678b0fffcd119
SHA13289cdded1a5f3178d8f75f33963ac510fa37317
SHA2567c5845575e0733422adf98a7f23e0912c0a954a991031bdec088ccfbf687e64e
SHA51210847fcf571de203336e86ad0055f16132aa508a73855abe2abafea6a1446fd1a0255492c201a7c00e071504daf47673e84676f88069bc701ffee7ae043e0add