Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    155s
  • max time network
    185s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/01/2024, 06:05

General

  • Target

    2024-01-11_b9ab2ffd5bae576fb74e709a8389645a_cryptolocker.exe

  • Size

    43KB

  • MD5

    b9ab2ffd5bae576fb74e709a8389645a

  • SHA1

    4165cdae0f054cfa6ab819859718accbab36b0d4

  • SHA256

    8eaf4053cfc3932702a510c645d7be83a14228c731d9da9a23d77fd3fc5715f9

  • SHA512

    9a7492875f02511c819952e5562e88980c9bdf49d4600d98e814b459076f27232ffe1213367479e56bb180e2af14b0a4cae7ce771c4cc95a3ebd016023459286

  • SSDEEP

    768:Kf1K2exg2kBwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZsBGGpebVIYLHA3Kx8:o1KhxqwtdgI2MyzNORQtOflIwoHNV2Xt

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-11_b9ab2ffd5bae576fb74e709a8389645a_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-11_b9ab2ffd5bae576fb74e709a8389645a_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3532
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:1572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    43KB

    MD5

    b5207466ca0062e71035794b3eed41b9

    SHA1

    863b89ac5b9417b5d94b7ac111357f769a20fd65

    SHA256

    a21c99588a829ff92341d696aa4cf07bb16312c4a92bf341d26861f22db271ac

    SHA512

    969ab49c035575c6aaa6cbcd2dc1cdeb95cfc684cf61bb05af52c7939221042275a89e31c1e7d7bfcaa9dcec236d8915813b69efcbb2fb50b435e77736eb9048

  • memory/1572-22-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/3532-0-0x00000000022F0000-0x00000000022F6000-memory.dmp

    Filesize

    24KB

  • memory/3532-1-0x00000000022F0000-0x00000000022F6000-memory.dmp

    Filesize

    24KB

  • memory/3532-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB