Analysis

  • max time kernel
    145s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    09-06-2024 05:48

General

  • Target

    VirusShare_6a83a846244ddb4203902127294fd995.exe

  • Size

    196KB

  • MD5

    6a83a846244ddb4203902127294fd995

  • SHA1

    3aefc8c14d05ba03e56a79a3f3b0083928f8260b

  • SHA256

    8131c49c9bf1746d8a62d00688fe06b5e0486c432cf04fb9551417400dcce641

  • SHA512

    9a2c7105c377309917d4ade88d2ec2d0b9167dd1ee2a98963142134181157d6a268cb26d47fcf9858edff22b5bafc34904468e8ec90769603772fbb1e173052d

  • SSDEEP

    3072:05LzbCcURim6TdEYd+bcsO8Dbu0V+DE55i/47CO7YgoFgIhpAhpqIM:HcImqYcbcstDbYy5hC8oFlQr

Score
10/10

Malware Config

Signatures

  • Locky

    Ransomware strain released in 2016, with advanced features like anti-analysis.

Processes

  • C:\Users\Admin\AppData\Local\Temp\VirusShare_6a83a846244ddb4203902127294fd995.exe
    "C:\Users\Admin\AppData\Local\Temp\VirusShare_6a83a846244ddb4203902127294fd995.exe"
    1⤵
      PID:1780

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1780-0-0x0000000000220000-0x0000000000226000-memory.dmp

      Filesize

      24KB

    • memory/1780-1-0x0000000000400000-0x000000000044E000-memory.dmp

      Filesize

      312KB

    • memory/1780-3-0x0000000000400000-0x000000000044E000-memory.dmp

      Filesize

      312KB

    • memory/1780-6-0x0000000000400000-0x000000000044E000-memory.dmp

      Filesize

      312KB

    • memory/1780-8-0x0000000000400000-0x000000000044E000-memory.dmp

      Filesize

      312KB

    • memory/1780-11-0x0000000000400000-0x000000000044E000-memory.dmp

      Filesize

      312KB

    • memory/1780-12-0x0000000000400000-0x000000000044E000-memory.dmp

      Filesize

      312KB

    • memory/1780-13-0x0000000000400000-0x000000000044E000-memory.dmp

      Filesize

      312KB

    • memory/1780-14-0x0000000000400000-0x000000000044E000-memory.dmp

      Filesize

      312KB

    • memory/1780-16-0x0000000000400000-0x000000000044E000-memory.dmp

      Filesize

      312KB