Analysis

  • max time kernel
    0s
  • max time network
    27s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/08/2023, 16:10

General

  • Target

    6a391634dc204622988d0c0ca2891861_cryptolocker_JC.exe

  • Size

    43KB

  • MD5

    6a391634dc204622988d0c0ca2891861

  • SHA1

    2f05921d07c6841f42a2d59924fa45298da66535

  • SHA256

    50d4bfa823e46c0b869deb4fea74fa9c5f340ac110a932734865c436b80c6d2a

  • SHA512

    361628d9a0e4c1c68bbeaf21e72f77b469dc9b088566919ae53b3d52c9106372014f311c660e151ce55d93d54ad12e51a137f54c7217772015881fb22e950655

  • SSDEEP

    768:79inqyNR/QtOOtEvwDpjBK/rJ+iNWMtQqC/hY:79mqyNhQMOtEvwDpjBxiMq8Y

Score
1/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a391634dc204622988d0c0ca2891861_cryptolocker_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\6a391634dc204622988d0c0ca2891861_cryptolocker_JC.exe"
    1⤵
      PID:1192

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1192-133-0x0000000000500000-0x000000000050F000-memory.dmp

            Filesize

            60KB

          • memory/1192-134-0x0000000002310000-0x0000000002316000-memory.dmp

            Filesize

            24KB