Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    05-05-2024 19:07

General

  • Target

    15dcc907e50ba030fbb85c4371e43d70a5b94cc8aada3efd36d32d338868cfed.exe

  • Size

    160KB

  • MD5

    b3ec5c2980115847958db6e6a3d18d33

  • SHA1

    9f8b1eda701c350af6d3f2a3026b2d1a490b00df

  • SHA256

    15dcc907e50ba030fbb85c4371e43d70a5b94cc8aada3efd36d32d338868cfed

  • SHA512

    3f99a6ee15ef0500ed0d7d87552b7700137f60fd45f71ea64666d325a8d6670e1e015b84371ebc5de3a06961ddb5dc539a3cc56e125d0fb3ce833fa15a921b8f

  • SSDEEP

    3072:kDYn+YZD0HvMaNdOfdhssFM88e5AQe2gh:uYZDBkOZze

Score
10/10

Malware Config

Signatures

  • clop

    Ransomware discovered in early 2019 which has been actively developed since release.

Processes

  • C:\Users\Admin\AppData\Local\Temp\15dcc907e50ba030fbb85c4371e43d70a5b94cc8aada3efd36d32d338868cfed.exe
    "C:\Users\Admin\AppData\Local\Temp\15dcc907e50ba030fbb85c4371e43d70a5b94cc8aada3efd36d32d338868cfed.exe"
    1⤵
      PID:2184

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2184-0-0x0000000074271000-0x0000000074272000-memory.dmp

      Filesize

      4KB

    • memory/2184-1-0x0000000074270000-0x000000007481B000-memory.dmp

      Filesize

      5.7MB

    • memory/2184-2-0x0000000074270000-0x000000007481B000-memory.dmp

      Filesize

      5.7MB

    • memory/2184-3-0x0000000074270000-0x000000007481B000-memory.dmp

      Filesize

      5.7MB