Behavioral task
behavioral1
Sample
2024-09-07_e877f4d52b168e749380a999d5ea7835_cryptolocker.exe
Resource
win7-20240903-en
General
-
Target
2024-09-07_e877f4d52b168e749380a999d5ea7835_cryptolocker
-
Size
43KB
-
MD5
e877f4d52b168e749380a999d5ea7835
-
SHA1
b79d8b970b6e971e4b886fb735cbe1779868b17b
-
SHA256
7dc8b0faa96ee068a2bd885156afc1e0a4a5ac949301b4e2b19b5ce830105df1
-
SHA512
a34e3ce3691b454c19263adf2878fcbc6e6256e7daad77f84b19f6ee37c9fca3ec4b7865275f6e88fd756d076924ea02d868670a0d79e88c7eb8f4ae220f1ae6
-
SSDEEP
768:bO74zYcgT/EkdCQgpwXFXSqQXfj0xKsJ9bZ:bO6YcA/Xk3wXFXSqAJIbZ
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-07_e877f4d52b168e749380a999d5ea7835_cryptolocker
Files
-
2024-09-07_e877f4d52b168e749380a999d5ea7835_cryptolocker.exe windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 16KB - Virtual size: 28KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE