Analysis

  • max time kernel
    0s
  • max time network
    111s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/01/2024, 12:13

General

  • Target

    2024-01-06_8fcd92a18698b13fc0ad2a7314f8ae6a_cryptolocker.exe

  • Size

    37KB

  • MD5

    8fcd92a18698b13fc0ad2a7314f8ae6a

  • SHA1

    6adcf16f47ffe07f52465f3fec4e6a375d62d227

  • SHA256

    d0b9da30e88771523a156173ebf61adba4879580fba535e8017f033f2ca88437

  • SHA512

    28c3567ad542ebf26f0c4912ea7d1e135217d8bd1a0207b744b3cf4f9c0537db112d195be0130f1e76783d2e982c92d0177c18921ce8ca28c437f1ca4f458893

  • SSDEEP

    768:bgX4zYcgTEu6QOaryfjqDDw3sCu529hBV:bgGYcA/53GADw8Ch93V

Score
3/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-06_8fcd92a18698b13fc0ad2a7314f8ae6a_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-06_8fcd92a18698b13fc0ad2a7314f8ae6a_cryptolocker.exe"
    1⤵
      PID:2908
      • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
        "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
        2⤵
          PID:5212

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2908-0-0x0000000002350000-0x0000000002356000-memory.dmp

        Filesize

        24KB

      • memory/2908-2-0x0000000003150000-0x0000000003156000-memory.dmp

        Filesize

        24KB

      • memory/2908-1-0x0000000002350000-0x0000000002356000-memory.dmp

        Filesize

        24KB

      • memory/5212-17-0x0000000003010000-0x0000000003016000-memory.dmp

        Filesize

        24KB

      • memory/5212-23-0x0000000002110000-0x0000000002116000-memory.dmp

        Filesize

        24KB