Analysis

  • max time kernel
    0s
  • max time network
    1s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-04-2024 03:27

General

  • Target

    2024-04-28_25a8e4762abce2ea1ee3012dc0e2031a_cryptolocker.exe

  • Size

    60KB

  • MD5

    25a8e4762abce2ea1ee3012dc0e2031a

  • SHA1

    975443291ae889495aff8fcef414c0a59390868b

  • SHA256

    fb50b865ed23abbd9e60c2848ca8f236dca1366b553d243a22d9a2c6dacea9da

  • SHA512

    e1d4853927d8d9cabf74e3de0aeef4d2537cdaeba0c2f3ca78eefc6c5a88538d90dc354c051bdbf768960d0fee17065939cb34433bbaa5543a4e7f83e4f410de

  • SSDEEP

    1536:ZzFbxmLPWQMOtEvwDpj386Sj/WprgJN6tZdOyJT/EH:ZVxkGOtEvwDpjcOU

Score
1/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-28_25a8e4762abce2ea1ee3012dc0e2031a_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-28_25a8e4762abce2ea1ee3012dc0e2031a_cryptolocker.exe"
    1⤵
      PID:2608

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2608-0-0x00000000004E0000-0x00000000004E3000-memory.dmp

      Filesize

      12KB

    • memory/2608-1-0x0000000000830000-0x0000000000836000-memory.dmp

      Filesize

      24KB