Analysis
-
max time kernel
93s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2024, 08:46
Behavioral task
behavioral1
Sample
2024-01-19_2636326a7cd194642328760a989c41db_cryptolocker.exe
Resource
win7-20231215-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-19_2636326a7cd194642328760a989c41db_cryptolocker.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2024-01-19_2636326a7cd194642328760a989c41db_cryptolocker.exe
-
Size
64KB
-
MD5
2636326a7cd194642328760a989c41db
-
SHA1
a9bc2116d7e8135a2524c99ddd2baa467571a1f9
-
SHA256
fd8fab50d82774548a8064012547792a06bbfd7a39590f3936797d0db76609f6
-
SHA512
9228897f2d80889956de3c3aaa71127815dcbbba8d971a05eb784ba4555f5eb10eade7b825a822213b19b92504e4942e8eca91c8a79dd2ddbd97a52c83c18cbd
-
SSDEEP
768:T6LsoEEeegiZPvEhHSG+g0Fum/kLyMro2GtOOtEvwDpjh:T6QFElP6n+g0wmddpMOtEvwDpj
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3356-0-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 644 3356 WerFault.exe 59
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-19_2636326a7cd194642328760a989c41db_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-19_2636326a7cd194642328760a989c41db_cryptolocker.exe"1⤵PID:3356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3356 -s 2162⤵
- Program crash
PID:644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3356 -ip 33561⤵PID:4604