Analysis

  • max time kernel
    0s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/01/2024, 06:01

General

  • Target

    2024-01-11_7b9999dfd2c86864f82c7a9165601563_cryptolocker.exe

  • Size

    45KB

  • MD5

    7b9999dfd2c86864f82c7a9165601563

  • SHA1

    6c40a86084a294aa2c7da0b77151b5f4174fe6c8

  • SHA256

    b5feac18a23c44ad7bda92d478388b683ab61dd8ce57a1317b869b98db065f41

  • SHA512

    cc738d7c4054d3b1d849c145b1282e33c79aabf1ef56aa35845fabfa0330f3e5dccae5dee7a5f3d68de8518674ddab878d7b5b1343ba71d2a76cde586ad7475c

  • SSDEEP

    768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37YbDu5z/hQk:bgGYcA/53GAA6y37nbb

Score
3/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-11_7b9999dfd2c86864f82c7a9165601563_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-11_7b9999dfd2c86864f82c7a9165601563_cryptolocker.exe"
    1⤵
      PID:3864
      • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
        "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
        2⤵
          PID:2496

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2496-17-0x0000000002240000-0x0000000002246000-memory.dmp

        Filesize

        24KB

      • memory/2496-23-0x0000000002210000-0x0000000002216000-memory.dmp

        Filesize

        24KB

      • memory/3864-0-0x0000000002350000-0x0000000002356000-memory.dmp

        Filesize

        24KB

      • memory/3864-2-0x0000000003150000-0x0000000003156000-memory.dmp

        Filesize

        24KB

      • memory/3864-1-0x0000000002350000-0x0000000002356000-memory.dmp

        Filesize

        24KB