Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
17/09/2023, 10:48 UTC
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-26_0f4b16be0052e0bab6698d9c9331844f_cryptolocker_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-26_0f4b16be0052e0bab6698d9c9331844f_cryptolocker_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-26_0f4b16be0052e0bab6698d9c9331844f_cryptolocker_JC.exe
-
Size
44KB
-
MD5
0f4b16be0052e0bab6698d9c9331844f
-
SHA1
6ca9b24bef24dfee7266666e279c9e42b1c212f8
-
SHA256
06b3b71920ef29235367f53be7040c9d8455e3d36e40916821709029eabc4619
-
SHA512
e357e2a078cbf53e4a811dfaa71c8d81146d2fd736cb956e50406ebb0b08628b4822391e4ac3eb68ae127bebdad99ff2802329792fb5530b7bfb737a8a4c54ca
-
SSDEEP
768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpjeJQ7suIlsw92KFXckd9d:V6QFElP6n+gMQMOtEvwDpjeJQ7pojakd
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation 2023-08-26_0f4b16be0052e0bab6698d9c9331844f_cryptolocker_JC.exe -
Executes dropped EXE 1 IoCs
pid Process 2800 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1824 wrote to memory of 2800 1824 2023-08-26_0f4b16be0052e0bab6698d9c9331844f_cryptolocker_JC.exe 87 PID 1824 wrote to memory of 2800 1824 2023-08-26_0f4b16be0052e0bab6698d9c9331844f_cryptolocker_JC.exe 87 PID 1824 wrote to memory of 2800 1824 2023-08-26_0f4b16be0052e0bab6698d9c9331844f_cryptolocker_JC.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-26_0f4b16be0052e0bab6698d9c9331844f_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-26_0f4b16be0052e0bab6698d9c9331844f_cryptolocker_JC.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2800
-
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request4.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request1.202.248.87.in-addr.arpaIN PTRResponse1.202.248.87.in-addr.arpaIN PTRhttps-87-248-202-1amsllnwnet
-
Remote address:8.8.8.8:53Request241.154.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request41.110.16.96.in-addr.arpaIN PTRResponse41.110.16.96.in-addr.arpaIN PTRa96-16-110-41deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request88.156.103.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestemrlogistics.comIN AResponseemrlogistics.comIN CNAMEtraff-4.hugedomains.comtraff-4.hugedomains.comIN CNAMEhdr-nlb8-39c51fa8696874ee.elb.us-east-1.amazonaws.comhdr-nlb8-39c51fa8696874ee.elb.us-east-1.amazonaws.comIN A3.94.41.167hdr-nlb8-39c51fa8696874ee.elb.us-east-1.amazonaws.comIN A52.86.6.113
-
Remote address:8.8.8.8:53Request86.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request206.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request8.3.197.209.in-addr.arpaIN PTRResponse8.3.197.209.in-addr.arpaIN PTRvip0x008map2sslhwcdnnet
-
Remote address:8.8.8.8:53Request240.81.21.72.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request48.229.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request90.16.208.104.in-addr.arpaIN PTRResponse
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
4.159.190.20.in-addr.arpa
-
71 B 116 B 1 1
DNS Request
1.202.248.87.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
241.154.82.20.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
41.110.16.96.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
88.156.103.20.in-addr.arpa
-
62 B 192 B 1 1
DNS Request
emrlogistics.com
DNS Response
3.94.41.16752.86.6.113
-
70 B 144 B 1 1
DNS Request
86.23.85.13.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
206.23.85.13.in-addr.arpa
-
70 B 111 B 1 1
DNS Request
8.3.197.209.in-addr.arpa
-
71 B 142 B 1 1
DNS Request
240.81.21.72.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
48.229.111.52.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
90.16.208.104.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5f0802b59367aea3b5582e36c7ccffcfb
SHA113502a5f93b041aa22a5ab1803025c4a969cc381
SHA256f939cd3ec83c584bd02d35b57ee4aada3e2cd0727d2cdebcd7b05ba28e67fcde
SHA512e6ecb9d31dc15ddb5378cd0983df735cda87a4005119993b72e98afa86ca897d161a688de59eea2b4f97865a912bd7423a0247ec63430c8f215bb12dbdd3b9e3
-
Filesize
44KB
MD5f0802b59367aea3b5582e36c7ccffcfb
SHA113502a5f93b041aa22a5ab1803025c4a969cc381
SHA256f939cd3ec83c584bd02d35b57ee4aada3e2cd0727d2cdebcd7b05ba28e67fcde
SHA512e6ecb9d31dc15ddb5378cd0983df735cda87a4005119993b72e98afa86ca897d161a688de59eea2b4f97865a912bd7423a0247ec63430c8f215bb12dbdd3b9e3
-
Filesize
44KB
MD5f0802b59367aea3b5582e36c7ccffcfb
SHA113502a5f93b041aa22a5ab1803025c4a969cc381
SHA256f939cd3ec83c584bd02d35b57ee4aada3e2cd0727d2cdebcd7b05ba28e67fcde
SHA512e6ecb9d31dc15ddb5378cd0983df735cda87a4005119993b72e98afa86ca897d161a688de59eea2b4f97865a912bd7423a0247ec63430c8f215bb12dbdd3b9e3