Static task
static1
Behavioral task
behavioral1
Sample
2024-09-05_ec63be9fbbc33928ed95941c990ab3ae_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-05_ec63be9fbbc33928ed95941c990ab3ae_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-05_ec63be9fbbc33928ed95941c990ab3ae_cryptolocker
-
Size
23KB
-
MD5
ec63be9fbbc33928ed95941c990ab3ae
-
SHA1
14c3d5b8ccc786b0ecbc5dd805f7e95e484b6328
-
SHA256
b3615231d2797d4c7d0273bbe539f424ce600d01204d527b9d569abc05b5824f
-
SHA512
14652d69394d4c8834a7627d8261740e7cc381f35731c19fdeca802fc7d95db79bcda5857ab692507621a32dea61f7160ae0014c6186c0abe8cbdf6c8481ee6a
-
SSDEEP
384:CBOkkLPcM4JIM39ZR8Z87XHjeKtEEue+63BYp2tOOtEvwDpjqIGRK:CB19M4JIhZMHSKtweHBrtOOtEvwDpjt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-05_ec63be9fbbc33928ed95941c990ab3ae_cryptolocker
Files
-
2024-09-05_ec63be9fbbc33928ed95941c990ab3ae_cryptolocker.exe windows:5 windows x86 arch:x86
1a37837ee1c6a4695e0f8fcef0f6b4f2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetModuleHandleA
GetProcAddress
gdi32
CreateFontIndirectA
user32
EndPaint
Sections
.MPRESS1 Size: 10KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.MPRESS2 Size: 1024B - Virtual size: 910B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE