Analysis

  • max time kernel
    0s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/01/2024, 05:50

General

  • Target

    2024-01-01_c31cfb8d6d321d50c65864fb5af119b8_cryptolocker.exe

  • Size

    39KB

  • MD5

    c31cfb8d6d321d50c65864fb5af119b8

  • SHA1

    0eae6d9d4deda3e92825406e050604377248f50d

  • SHA256

    f5bcb5d8ea6fb9dc7e98a129085376f75d5ab6104e0d9ee16560037ef72d2884

  • SHA512

    d47f779d2e0a93062d880173e291dfc7b4dae36b3fa89539d2b1439ec0a75dccfa0a9052abf8bf3679b809497a7bb0283c58c78b331843303ec68545a7295a5d

  • SSDEEP

    768:bIDOw9UiaCHfjnE0Sf88AvvP1oghYvm9/6DyUML:bIDOw9a0Dwo3P1ojvUSDhw

Score
3/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-01_c31cfb8d6d321d50c65864fb5af119b8_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-01_c31cfb8d6d321d50c65864fb5af119b8_cryptolocker.exe"
    1⤵
      PID:3316
      • C:\Users\Admin\AppData\Local\Temp\lossy.exe
        "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
        2⤵
          PID:4548

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/3316-1-0x0000000000610000-0x0000000000616000-memory.dmp

              Filesize

              24KB

            • memory/3316-4-0x00000000005F0000-0x00000000005F6000-memory.dmp

              Filesize

              24KB

            • memory/3316-0-0x00000000005F0000-0x00000000005F6000-memory.dmp

              Filesize

              24KB

            • memory/4548-23-0x00000000005A0000-0x00000000005A6000-memory.dmp

              Filesize

              24KB

            • memory/4548-17-0x00000000005C0000-0x00000000005C6000-memory.dmp

              Filesize

              24KB