Analysis
-
max time kernel
0s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2024, 05:53
Behavioral task
behavioral1
Sample
2024-01-01_f3c4fb654936c8f32563d0f4e7be14d1_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-01_f3c4fb654936c8f32563d0f4e7be14d1_cryptolocker.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-01_f3c4fb654936c8f32563d0f4e7be14d1_cryptolocker.exe
-
Size
84KB
-
MD5
f3c4fb654936c8f32563d0f4e7be14d1
-
SHA1
020e898fffd2d3a356121f339240500166d2bedf
-
SHA256
45a62e9038bb8add46da82e7a489b202b3ace9cc32ab336a89f5cd39e2892bbd
-
SHA512
8797e6c3efb5b434f20a07d0759870a35d685eda43df4efdbd18af7204a42c52143544b84a49bef3f1041fd7c071c9b266d299e83b90e944521acf2f4bea644a
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRMNM:zCsanOtEvwDpjo
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4816-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/4816-17-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/2784-48-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-01_f3c4fb654936c8f32563d0f4e7be14d1_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-01_f3c4fb654936c8f32563d0f4e7be14d1_cryptolocker.exe"1⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵PID:2784
-