Analysis
-
max time kernel
1s -
max time network
7s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
01/08/2023, 15:18
Behavioral task
behavioral1
Sample
2b051dcc74cb853fa0c1a79fd9029e6a_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
2b051dcc74cb853fa0c1a79fd9029e6a_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
2b051dcc74cb853fa0c1a79fd9029e6a_cryptolocker_JC.exe
-
Size
95KB
-
MD5
2b051dcc74cb853fa0c1a79fd9029e6a
-
SHA1
0f74eb04b9b522fa8dc10d1bc7ac617969c2ce1a
-
SHA256
ab9c468a6f5d6227c247c0533efad93ad40217df3c871d2a0cd9095b262db730
-
SHA512
dd07bf9ec39c9fee36be8490e79cf52e069d489cedb11e9fbe7866001daaf160a31f8a68c54051334100c60f149470befafd31eeda9990733e412d3088fcb49a
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQbCJh5:AnBdOOtEvwDpj6zQ
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4476-133-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/files/0x000200000002000a-146.dat upx behavioral2/files/0x000200000002000a-148.dat upx behavioral2/memory/4476-150-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/files/0x000200000002000a-149.dat upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b051dcc74cb853fa0c1a79fd9029e6a_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\2b051dcc74cb853fa0c1a79fd9029e6a_cryptolocker_JC.exe"1⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵PID:4936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD5f443e1e9fd0a3f0f4472690e07a5b0c1
SHA1367ecb56adf250429650e329eb4f23a72b909cea
SHA256ecdacf57e4ed1debd98aedb8f8250308b6a9ee69120bf9cd1c497bcf8c98bd62
SHA512492e169fbd71d24beeddb8756b23d3ea08f2f98a6a37b77b8718d5fd752d3f4895575b44ef23c0cdd1603ed5e5809327932e6dbee8f7ec09332eba11c9b9f2cc
-
Filesize
95KB
MD5f443e1e9fd0a3f0f4472690e07a5b0c1
SHA1367ecb56adf250429650e329eb4f23a72b909cea
SHA256ecdacf57e4ed1debd98aedb8f8250308b6a9ee69120bf9cd1c497bcf8c98bd62
SHA512492e169fbd71d24beeddb8756b23d3ea08f2f98a6a37b77b8718d5fd752d3f4895575b44ef23c0cdd1603ed5e5809327932e6dbee8f7ec09332eba11c9b9f2cc
-
Filesize
95KB
MD5f443e1e9fd0a3f0f4472690e07a5b0c1
SHA1367ecb56adf250429650e329eb4f23a72b909cea
SHA256ecdacf57e4ed1debd98aedb8f8250308b6a9ee69120bf9cd1c497bcf8c98bd62
SHA512492e169fbd71d24beeddb8756b23d3ea08f2f98a6a37b77b8718d5fd752d3f4895575b44ef23c0cdd1603ed5e5809327932e6dbee8f7ec09332eba11c9b9f2cc