Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
06/08/2023, 15:14
Behavioral task
behavioral1
Sample
8af28b36c7ca3c2d200ca0db11079e4a_cryptolocker_JC.exe
Resource
win7-20230712-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
8af28b36c7ca3c2d200ca0db11079e4a_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
8af28b36c7ca3c2d200ca0db11079e4a_cryptolocker_JC.exe
-
Size
60KB
-
MD5
8af28b36c7ca3c2d200ca0db11079e4a
-
SHA1
c1c1345e3e06c02f8ba4644798e0036ac215d5fa
-
SHA256
ca1237ca865b943bd14e569a8ef5d26fa5bdc7d2e35732b08f77ae74fa4dd787
-
SHA512
af606b669026fb2f1427c4db579ff5c7a14fa424d20f58862fd53f8cc058fcede5bcaf241f668fd365cc9d02a66a24110741ec03c7ae3c5a327e458a870f0e56
-
SSDEEP
768:P8mnjO6LsoEEeegiZPvEhHSG+g0Eum/kLyMro2GtOOtEvwDpjK:P8mnK6QFElP6n+g0RmddpMOtEvwDpj
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2260-54-0x0000000000500000-0x000000000050F311-memory.dmp upx