Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-14_d563954591a1a13a47b8c834fe0e4648_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-14_d563954591a1a13a47b8c834fe0e4648_cryptolocker.exe
Resource
win10v2004-20240508-en
Target
2024-06-14_d563954591a1a13a47b8c834fe0e4648_cryptolocker
Size
43KB
MD5
d563954591a1a13a47b8c834fe0e4648
SHA1
51a84d7871799385a4a2efa0b24fea60125fe872
SHA256
dda0d877037dbd0655ba82912271d0f177541375f908b0b3264316ddfeedcea6
SHA512
dcdd7d69f2df6e44d1474567e986b3307cce2cd4f0bdb37fc2230e2ff43afcd5ecef00bcec69b442b728e5abbd4e2cb9ebc251799eef53dbb5ba48fbd1472862
SSDEEP
768:bQyC4GyNM01GuQMNXwXOQ69zbjlAAX5e9zx:bQpYayGiAizbR9Xwzx
resource | yara_rule |
---|---|
sample | CryptoLocker_rule2 |
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
EndPaint
GetMessageA
DrawTextA
ShowWindow
UpdateWindow
DispatchMessageA
BeginPaint
TranslateMessage
CreateWindowExA
RegisterClassExA
DefWindowProcA
MessageBoxA
SendMessageA
DestroyWindow
LoadIconA
GetWindowRect
LoadCursorA
PostQuitMessage
SetWindowPos
GetLastError
lstrcpyA
GetModuleHandleA
GetCommandLineA
FindFirstFileA
GetCurrentDirectoryA
FindClose
FindNextFileA
DeleteFileA
CloseHandle
CreateFileA
CreateFontIndirectA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ