Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2024, 05:52
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-01_f2251bae659c8bac534ce49ec4b33055_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-01_f2251bae659c8bac534ce49ec4b33055_cryptolocker.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-01_f2251bae659c8bac534ce49ec4b33055_cryptolocker.exe
-
Size
71KB
-
MD5
f2251bae659c8bac534ce49ec4b33055
-
SHA1
38f4dc5a88d2d27a85e7261d9df6d600e6e11ad2
-
SHA256
a0d59aad6c681d036f48bd28866adbfae5e05890a750187a4c8040cb25f73fe0
-
SHA512
cd0b227e9cd08a8dfb64453eec6d863ed94b4f9e30973d54476adb2067dffc5f925ab785ba3b4111d6e022fca1b11f433ee0ba001d9ac98afe23089bfe328bb5
-
SSDEEP
1536:X6QFElP6n+gJQMOtEvwDpjBZYTjipvF2bx1h:X6a+SOtEvwDpjBZYvQd2h
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 2024-01-01_f2251bae659c8bac534ce49ec4b33055_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 4568 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2952 wrote to memory of 4568 2952 2024-01-01_f2251bae659c8bac534ce49ec4b33055_cryptolocker.exe 23 PID 2952 wrote to memory of 4568 2952 2024-01-01_f2251bae659c8bac534ce49ec4b33055_cryptolocker.exe 23 PID 2952 wrote to memory of 4568 2952 2024-01-01_f2251bae659c8bac534ce49ec4b33055_cryptolocker.exe 23
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-01_f2251bae659c8bac534ce49ec4b33055_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-01_f2251bae659c8bac534ce49ec4b33055_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:4568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD53a81720924e5ca42dc03ac539e746be1
SHA162d946a4d4c37e3df9ec543a6e23410b57935600
SHA256c754d58de6a35ba34a3304b850ce0b4848c1ae267020c714c96a6583a9b03e20
SHA5122e6f91cecfe523ad5fd57c54d2344232ac0e3277fa05359ecac9e639c5257009d7aadaf425610391fe87e855832724fd5a254bb69e07b7de12c5f69eabdb126b