Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 17:42
Behavioral task
behavioral1
Sample
2024-01-25_13db4aab052cb358aa63050234308310_cryptolocker.exe
Resource
win7-20231215-en
2 signatures
150 seconds
General
-
Target
2024-01-25_13db4aab052cb358aa63050234308310_cryptolocker.exe
-
Size
60KB
-
MD5
13db4aab052cb358aa63050234308310
-
SHA1
1210b51fe42708894b61576454554a10c8106a63
-
SHA256
4ac5b277f3874e4cebae941deaa6eebb74871898b1ec20f9adcfb778cf3d51ef
-
SHA512
8e68b842ffa2632c8c99b955072f3152e4fd829b3860e60358bdc3088ae5b33af1bd9084eff180feebc1f17da17919f0ac5ab50b5a2d63ae0fa952fa65763878
-
SSDEEP
768:P8mnjO6LsoEEeegiZPvEhHSG+g1Qum/kLyMro2GtOOtEvwDpjK:P8mnK6QFElP6n+g1NmddpMOtEvwDpj
Score
9/10
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2152-0-0x0000000000500000-0x000000000050F311-memory.dmp UPX -
Processes:
resource yara_rule behavioral1/memory/2152-0-0x0000000000500000-0x000000000050F311-memory.dmp upx