Analysis
-
max time kernel
2s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2024, 05:52
Behavioral task
behavioral1
Sample
2024-01-01_e53e92542efc3577ec5256e41104b25c_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-01_e53e92542efc3577ec5256e41104b25c_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-01_e53e92542efc3577ec5256e41104b25c_cryptolocker.exe
-
Size
127KB
-
MD5
e53e92542efc3577ec5256e41104b25c
-
SHA1
dfbfca9017a4a7ca37c76fa7a37d1bdc7f32c7fc
-
SHA256
d5f6728915d111b3b7d6618a4f1fed91210a86e3dd8806982595bbf89362034c
-
SHA512
002bd5995406e3e70882e19d96e5c8ab8b4e7145e1eabff2a2a5009d2c9db961481704699ad5a1c28059493645aaaca298b3e9c836ba353472784e9e3b7a2879
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1eh3:AnBdOOtEvwDpj6zL
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1188-0-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/files/0x000700000002320a-13.dat upx behavioral2/memory/1188-22-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/memory/3664-17-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/files/0x000700000002320a-16.dat upx behavioral2/files/0x000700000002320a-15.dat upx behavioral2/memory/3664-27-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-01_e53e92542efc3577ec5256e41104b25c_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-01_e53e92542efc3577ec5256e41104b25c_cryptolocker.exe"1⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵PID:3664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5a0458ca08632b618b607200d9ae14fa0
SHA17d2a0381b48f35ad050dc67764e2eab98973d78e
SHA256258c33ef3adccf4bd604393c912e2df69a552814a6ce5ff5f2c75097119d29a9
SHA51228f0b542d75341756f6e1a6b8d2c656c640b0bae3debf92764e01e77fbcfc26680fbcfd6d52911103c2e47a915e5dbb73e8ab80079b56ffaaa5866c0db74d14a
-
Filesize
13KB
MD5f3737f394fbc83af8c67778986972c85
SHA1908160aac8e79f855a8421672b27cbf924188eeb
SHA256e3752f11895a35bce3c099012073ffccbea0cd587de3250596117713f2b03c87
SHA5122cbbe8bf03f3ed755a0450552e9d7921bc800a5a30cfeda918247800ee3db95ed7f3d4bd85806aee04debbd27e932d8470e558ee71e738e2eb51d0ef67b2bc26
-
Filesize
46KB
MD537e6afda5ce079bd5cb4682e37640061
SHA1f1e3d32e9e79af62de5bc16f8f198408402a65e4
SHA2569ab59702534738a19f72e7680b21e6077a95efa127c99314f0afbecec6264a72
SHA512d331ae3d166c304f88bb7d28ff77a0b98720720549f7f6f6941bb893f0cc8e7a29df532a9ba1c34a517b86d2c91bf638aa93b634488b261bad9d63cf08a53f7e