Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
02/09/2023, 19:20
Behavioral task
behavioral1
Sample
2023-08-22_7295b5042553809b95f4f77b20d43025_cryptolocker_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-22_7295b5042553809b95f4f77b20d43025_cryptolocker_JC.exe
Resource
win10v2004-20230831-en
General
-
Target
2023-08-22_7295b5042553809b95f4f77b20d43025_cryptolocker_JC.exe
-
Size
145KB
-
MD5
7295b5042553809b95f4f77b20d43025
-
SHA1
321faf04db74101ea632298abafbbeffb954e593
-
SHA256
928476d931b09fb2ec850737fa0629c34f17772dab1064829d3f23ecd0ab40d0
-
SHA512
282fe25758ec74c50db66fb5e53881f3c129d854ece76926fcdafc5dd3d837faa01df5520d110598819d64b88e7000d9217bb84e040073dc2014cd884de2861a
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNgp699GNtL1eex:T6a+rdOOtEvwDpjLz4
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000\Control Panel\International\Geo\Nation 2023-08-22_7295b5042553809b95f4f77b20d43025_cryptolocker_JC.exe -
Executes dropped EXE 1 IoCs
pid Process 2220 asih.exe -
resource yara_rule behavioral2/memory/4464-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/files/0x0008000000023218-13.dat upx behavioral2/files/0x0008000000023218-15.dat upx behavioral2/memory/2220-17-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/4464-18-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/files/0x0008000000023218-16.dat upx behavioral2/memory/2220-27-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4464 wrote to memory of 2220 4464 2023-08-22_7295b5042553809b95f4f77b20d43025_cryptolocker_JC.exe 85 PID 4464 wrote to memory of 2220 4464 2023-08-22_7295b5042553809b95f4f77b20d43025_cryptolocker_JC.exe 85 PID 4464 wrote to memory of 2220 4464 2023-08-22_7295b5042553809b95f4f77b20d43025_cryptolocker_JC.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-22_7295b5042553809b95f4f77b20d43025_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-22_7295b5042553809b95f4f77b20d43025_cryptolocker_JC.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145KB
MD54eec5e9ef65779b3aefb570c1c73beee
SHA1a2ab3cd7dd74729606802d15c907c833a81a9347
SHA256662a063ab241a7c86b4faa317ca88b92aaf1e9ee8b7f9bffff2ade3e18496ae5
SHA512699642be08cbad92b66518d6bca55a60c1221a35f15e1ebbb3babbd889f14ba45985ead956828529219fd2d869dce897ec17971a8c7004e1a59b9a7bfaabef65
-
Filesize
145KB
MD54eec5e9ef65779b3aefb570c1c73beee
SHA1a2ab3cd7dd74729606802d15c907c833a81a9347
SHA256662a063ab241a7c86b4faa317ca88b92aaf1e9ee8b7f9bffff2ade3e18496ae5
SHA512699642be08cbad92b66518d6bca55a60c1221a35f15e1ebbb3babbd889f14ba45985ead956828529219fd2d869dce897ec17971a8c7004e1a59b9a7bfaabef65
-
Filesize
145KB
MD54eec5e9ef65779b3aefb570c1c73beee
SHA1a2ab3cd7dd74729606802d15c907c833a81a9347
SHA256662a063ab241a7c86b4faa317ca88b92aaf1e9ee8b7f9bffff2ade3e18496ae5
SHA512699642be08cbad92b66518d6bca55a60c1221a35f15e1ebbb3babbd889f14ba45985ead956828529219fd2d869dce897ec17971a8c7004e1a59b9a7bfaabef65