Analysis
-
max time kernel
0s -
max time network
16s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 00:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-25_c2d5f8626fef4183816fc71514bddb1d_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-25_c2d5f8626fef4183816fc71514bddb1d_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-25_c2d5f8626fef4183816fc71514bddb1d_cryptolocker.exe
-
Size
38KB
-
MD5
c2d5f8626fef4183816fc71514bddb1d
-
SHA1
18e1023fc28cd5bb21ec40bebd80044c35eb0d85
-
SHA256
9f891b7f43bc2c652a68d886258ef85185123f6b0c8c59d7991c387b4b535ccc
-
SHA512
036f64a2be1c074de8f5b8308d76777359fabbbeae34e54276e1658a256a0cac1fa57d6e090423aceb2d540dfd315fd252e278a94804c14d48e9ee2ef9e11147
-
SSDEEP
384:bgX4uGLLQRcsdeQ7/nQu63Ag7YmecFanrlwfjDUkKDfWf0w3sp8u5cZ95d9hTf:bgX4zYcgTEu6QOaryfjqDDw3sCu529hL
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x000c000000023140-12.dat CryptoLocker_rule2
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_c2d5f8626fef4183816fc71514bddb1d_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_c2d5f8626fef4183816fc71514bddb1d_cryptolocker.exe"1⤵PID:3916
-
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵PID:3008
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD54e97c558fd554f8e83c79bf5f02511b4
SHA17aa1a5e432de8eb457161867e7a0bf3b932c9db1
SHA2563db582f53abc811b1f49d80b1876e01e347ce003696639028ba87e7f472f6324
SHA51244913db5531f7286e67ec25c60cf9b89e232dc7de0fcef75dbd6121d7d5fe87bce0a0f3b352bb93f995bca7c0c26c10e261dc00dd3235826e91d26c5ad34ae38