Analysis
-
max time kernel
0s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 12:19
Behavioral task
behavioral1
Sample
2024-01-06_fbd7ae83647d22b085264c982f290c21_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-06_fbd7ae83647d22b085264c982f290c21_cryptolocker.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-06_fbd7ae83647d22b085264c982f290c21_cryptolocker.exe
-
Size
87KB
-
MD5
fbd7ae83647d22b085264c982f290c21
-
SHA1
e0e28da863e314984df61877225e0133a7c64cd8
-
SHA256
3db746457a19b5f11c69fae4310ad1f6fdc6dbc5e602fa4a68243bbc30a8aa08
-
SHA512
74e99be368faca5836ebbe728a539b56bce4a209617bbea98b3ea77582769de1fbf27ecb3b366c892b7a84ea0ada809b6d037604bc031bddc268f7b21769a5ec
-
SSDEEP
1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRMy8w:zCsanOtEvwDpjk
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4456-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/4456-17-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3140-60-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-06_fbd7ae83647d22b085264c982f290c21_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-06_fbd7ae83647d22b085264c982f290c21_cryptolocker.exe"1⤵PID:4456
-
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵PID:3140
-