Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 17:51
Behavioral task
behavioral1
Sample
2024-01-25_53eb70165f5fc2b0c5841693c4176abc_cryptolocker.exe
Resource
win7-20231215-en
windows7-x64
1 signatures
150 seconds
General
-
Target
2024-01-25_53eb70165f5fc2b0c5841693c4176abc_cryptolocker.exe
-
Size
64KB
-
MD5
53eb70165f5fc2b0c5841693c4176abc
-
SHA1
6d375ae056a0ac10ff4f184b5924767dcf9775c6
-
SHA256
61402873e79d37fac22cc1a27bad70ba1fe5e2ca1c81051ff74e066a866317db
-
SHA512
0750a9e8f210667ea75cc9cb106a130a217115dbc26ecec6612290d0dc0e36f19be7b54d94acf115abca724686f5856f125a8699ef170154bf1bc6c0b4f4d1df
-
SSDEEP
768:T6LsoEEeegiZPvEhHSG+g0mum/kLyMro2GtOOtEvwDpjh:T6QFElP6n+g0fmddpMOtEvwDpj
Score
7/10
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1948-0-0x0000000000500000-0x0000000000510000-memory.dmp upx