Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    4s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/01/2024, 05:38

General

  • Target

    2024-01-01_10217eb7377634c92bb645368d2a2b59_cryptolocker.exe

  • Size

    43KB

  • MD5

    10217eb7377634c92bb645368d2a2b59

  • SHA1

    70d5d4d6cb469f84c51e3e6441d5891bf36f077b

  • SHA256

    ccb734816af02f716fad031be9432fa9ff100142fadab7d4dc701cbaeb07463a

  • SHA512

    2600b88786b834b82badd6e6fe2735b6f7bb110959c0a74317de62909e470deffee28c89e71baf6efe03c0f30eff4acf2698cae2349c93d4297993d6076b320a

  • SSDEEP

    768:Kf1K2exg2kBwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZsBGGpebVIYLHA3Kxh:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XY

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-01_10217eb7377634c92bb645368d2a2b59_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-01_10217eb7377634c92bb645368d2a2b59_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    PID:5020
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
        PID:1560

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\hurok.exe

      Filesize

      14KB

      MD5

      3d59451b67f380db2122e39a2e5b274b

      SHA1

      03f1cd718521810475b30245e23ab2d4b2b965b9

      SHA256

      03a4ead5583c920b02dbd625bc2ee17202e3ef269d0e612f776af40658d7daca

      SHA512

      3e7b943c4c6721f97527935371d03121392e9ee4bb7e1869bde0039e9df2d9f6cd8f63a3a9a2cbbe58a1efab7c55d5165fc57b2d3137aff6b780f239bb201c6c

    • C:\Users\Admin\AppData\Local\Temp\hurok.exe

      Filesize

      1KB

      MD5

      829984de45aafe680eb9766631bdaf7d

      SHA1

      41b0c2f8b517d1c2b517ba5cc4299ba7d35b2e14

      SHA256

      6a9eb28d7c8d2d0ff883db4d99afc8a0c3460aeab5e5c47018961fe61298af45

      SHA512

      1564f1740ad67245509771f56ba1d8fdc6e49fa63e99403a9cc5fac9dbc0c96c21cf5f9a2afcbd146d9242b03d24b2b32f09790bd2f469a5f8d89a7d20fdc4be

    • memory/1560-25-0x0000000001F00000-0x0000000001F06000-memory.dmp

      Filesize

      24KB

    • memory/5020-1-0x0000000002180000-0x0000000002186000-memory.dmp

      Filesize

      24KB

    • memory/5020-0-0x0000000002180000-0x0000000002186000-memory.dmp

      Filesize

      24KB

    • memory/5020-2-0x0000000000400000-0x0000000000406000-memory.dmp

      Filesize

      24KB