Analysis
-
max time kernel
0s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2024, 05:37
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-01_08a6908fb704204ebbe7698bd66751f0_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-01_08a6908fb704204ebbe7698bd66751f0_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-01_08a6908fb704204ebbe7698bd66751f0_cryptolocker.exe
-
Size
35KB
-
MD5
08a6908fb704204ebbe7698bd66751f0
-
SHA1
abe819fa80dcbd24d1df412da34897e3151326d4
-
SHA256
e2ad65235c16cc843c980ef3718a2f38ca6ebc17f808fe3b9c0b605af7e38d5f
-
SHA512
411dc64792ccb43f332ac3c558fcbef2eed626a4755ee9ea684217721b5cc7c2225257b97f3dc144dd795d3293a265b74b9b13cdfecf96724a014f173e508a37
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBVaD3TP7Dt2:X6QFElP6n+gJQMOtEvwDpjBmzDI
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-01_08a6908fb704204ebbe7698bd66751f0_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-01_08a6908fb704204ebbe7698bd66751f0_cryptolocker.exe"1⤵PID:4052
-
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵PID:2228
-