Analysis
-
max time kernel
93s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 15:52
Behavioral task
behavioral1
Sample
2024-01-25_db6bc5165385d7c2d19ac1e688ce6dfe_cryptolocker.exe
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
General
-
Target
2024-01-25_db6bc5165385d7c2d19ac1e688ce6dfe_cryptolocker.exe
-
Size
60KB
-
MD5
db6bc5165385d7c2d19ac1e688ce6dfe
-
SHA1
d2fa181c2fc9f7197a68400b8e7a748b68b5c995
-
SHA256
fff418a6c6d2e3b0f7aa2b92218d894ccc988d754b1b4928d58ea94f81eeaf8f
-
SHA512
4aac58e53ecc90b606b44d2aaf17ed4276a808edfcad1732a6c72238e2160edecd3aec4d97fa73557df867185dfc040d080275eeccbce7de6686a515dea69227
-
SSDEEP
768:P8mnjO6LsoEEeegiZPvEhHSG+gwyum/kLyMro2GtOOtEvwDpjK:P8mnK6QFElP6n+gwrmddpMOtEvwDpj
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3560-0-0x0000000000500000-0x000000000050F311-memory.dmp UPX -
Processes:
resource yara_rule behavioral2/memory/3560-0-0x0000000000500000-0x000000000050F311-memory.dmp upx -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1768 3560 WerFault.exe 2024-01-25_db6bc5165385d7c2d19ac1e688ce6dfe_cryptolocker.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_db6bc5165385d7c2d19ac1e688ce6dfe_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_db6bc5165385d7c2d19ac1e688ce6dfe_cryptolocker.exe"1⤵PID:3560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3560 -s 2162⤵
- Program crash
PID:1768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3560 -ip 35601⤵PID:4664
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3560-0-0x0000000000500000-0x000000000050F311-memory.dmpFilesize
60KB