Analysis

  • max time kernel
    2s
  • max time network
    15s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-03-2024 02:56

General

  • Target

    2024-03-09_cd9f8bfab15163a4c4eca1648ec8e57a_cryptolocker.exe

  • Size

    82KB

  • MD5

    cd9f8bfab15163a4c4eca1648ec8e57a

  • SHA1

    810cd02fc1084a6e2e1cf1c0fceb00561434529f

  • SHA256

    3351fbe40b2160621cd877f5bd1851fd298fa8dedb1e36354d42940d89d66d1d

  • SHA512

    0ae2595fa3f740c387146db83680ecb0d0b4e0ba3c144e848a020aae7fd3550fbd7e6af6b4860e65f1077dbc5041761a525ce1e3a39f965c22c7df67fadec000

  • SSDEEP

    1536:vj+jsMQMOtEvwDpj5HwYYTjipvF2hBfWafHNB0K:vCjsIOtEvwDpj5H9YvQd2/

Score
1/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-09_cd9f8bfab15163a4c4eca1648ec8e57a_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-09_cd9f8bfab15163a4c4eca1648ec8e57a_cryptolocker.exe"
    1⤵
      PID:3268

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3268-0-0x0000000000670000-0x0000000000676000-memory.dmp

      Filesize

      24KB