Analysis
-
max time kernel
0s -
max time network
49s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2024, 05:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-01_1556c8d62b334f19f0ae1cf663dc3961_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-01_1556c8d62b334f19f0ae1cf663dc3961_cryptolocker.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-01_1556c8d62b334f19f0ae1cf663dc3961_cryptolocker.exe
-
Size
124KB
-
MD5
1556c8d62b334f19f0ae1cf663dc3961
-
SHA1
c6a5e5ba7c24742706e0d05379bf34fd1f162301
-
SHA256
eb6fed345b8b405d12c88028310814e43dd11c6be0b55fdd8d474e2dfed8c69d
-
SHA512
cb8d45bae029e8bbd4dadfb6dacfe38df597485717cac223c226865bf4342e80af80622e6222f2a0f6f8a6da1c8fb246bb7484d2d280171cd4c4f18c218e538b
-
SSDEEP
1536:vj+jsMQMOtEvwDpj5HwYYTjipvF2hBfIuBKLUYOVbvh//FT:vCjsIOtEvwDpj5H9YvQd2R/
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-01_1556c8d62b334f19f0ae1cf663dc3961_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-01_1556c8d62b334f19f0ae1cf663dc3961_cryptolocker.exe"1⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵PID:3400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD5a369f89308010f32cc2473e10ef523c9
SHA18eb1233706e92619b4a1aee505458f4ab035e2b8
SHA256b2796c8c1187a402dacf48d2d851f1c4ea07f954f0dfb735202ea1f60a3dd1ab
SHA512e17271944f98d352d0269453faaf6de0f0fb24750bd83862acaa5fcc4fb6dc43591bd42d5c3ea64f9eddecc9cf090d3b98f7c06b145522fa697521969f0c0413
-
Filesize
63KB
MD58219634960d250b7a1bd523b41f570f1
SHA14fc7cfe2447dcb3c61a8386f64eea86551efb422
SHA25684e7c456fa4011d09916fa271f1f56cd4f45f07814bdb36043355c921623f90d
SHA512dcb8a4205cfcf85936fc1a0c5638a210224e967efdf035992026866d005ce8cb49cc9f6114750811a5dea4acab1469ca236b4d3033388d8ab8cc68d887a19195
-
Filesize
79KB
MD5ed0ec0c7f78b2a6715e8e6fb9b706f8c
SHA155f67c8754505a4cba62a162b6bf4975586f2be7
SHA2569e58ddacdf8657721205b47a4e8ac14036d34b5186f744f83b20295a663a3d66
SHA5127d76cd0edd50366b7237f9463751af9b00e9d7e9e301d293267487f8651344b9f748c898f143793b68dd27fb74e0dc4ba15b50f4b06dc80b0bc91a6e998152d7
-
Filesize
315B
MD5a34ac19f4afae63adc5d2f7bc970c07f
SHA1a82190fc530c265aa40a045c21770d967f4767b8
SHA256d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
SHA51242e53d96e5961e95b7a984d9c9778a1d3bd8ee0c87b8b3b515fa31f67c2d073c8565afc2f4b962c43668c4efa1e478da9bb0ecffa79479c7e880731bc4c55765