Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2024, 22:44
Behavioral task
behavioral1
Sample
2024-01-26_9e16e9f9ed54c7dbcd250a9bc72fd7dc_cryptolocker.exe
Resource
win7-20231215-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-26_9e16e9f9ed54c7dbcd250a9bc72fd7dc_cryptolocker.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2024-01-26_9e16e9f9ed54c7dbcd250a9bc72fd7dc_cryptolocker.exe
-
Size
64KB
-
MD5
9e16e9f9ed54c7dbcd250a9bc72fd7dc
-
SHA1
2ec0753edbca770128811ecb056401178d55ca97
-
SHA256
7832a477a92508e3ccad118823823ebdee6cacf8d4b31856753937f4e91f0b87
-
SHA512
ed3020f7e8b2772af89c013d1d5dd41fa5abcf8a5b85e1ca1f203981e23b8da6531d9f9a75f1e65c5dcf090bb861e9d1e841a235d4560487ccadff6146735113
-
SSDEEP
768:T6LsoEEeegiZPvEhHSG+gtcum/kLyMro2GtOOtEvwDpjh:T6QFElP6n+gtpmddpMOtEvwDpj
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4376-0-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2248 4376 WerFault.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_9e16e9f9ed54c7dbcd250a9bc72fd7dc_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-26_9e16e9f9ed54c7dbcd250a9bc72fd7dc_cryptolocker.exe"1⤵PID:4376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 2162⤵
- Program crash
PID:2248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4376 -ip 43761⤵PID:1948