Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    113s
  • max time network
    176s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/01/2024, 23:33

General

  • Target

    2024-01-18_f11b7aa1d782019f8005767227101a6b_cryptolocker.exe

  • Size

    43KB

  • MD5

    f11b7aa1d782019f8005767227101a6b

  • SHA1

    03c77e80f90eb2f67b6146ad8e50d012a4240a46

  • SHA256

    ac388de0ae5999c4bd5755b0cfd262451f7026e3a9634c4c7b7b03931cbbc1fb

  • SHA512

    5dd5443122fc892e33e1a19ef6eebd5f86c9e42712ad0165b5d20286d756bdbb1b8255b5e418e0b53ca2cd38c5a9f616db7241eda3779a8e23b6312d151d3960

  • SSDEEP

    768:bgX4zYcgTEu6QOaryfjqDlC6JFbK37Ylmbk:bgGYcA/53GAA6y37QmY

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-18_f11b7aa1d782019f8005767227101a6b_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-18_f11b7aa1d782019f8005767227101a6b_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4160
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    44KB

    MD5

    0794b54fa18ba119169ee2571ecbba02

    SHA1

    7fa7a6bbea2d28e94e2661472eb9045cda26ba81

    SHA256

    78318653d0b0c3979d6d83614b5ef9f889cb8fde9fca62609146cada92f09bac

    SHA512

    38be532e2f049082be20e96965a75d77e28f950008ecf23939d543077ca687f4cce2f01a5f295da528490090f374a81c65a68c0a203f702951375c12babafa02

  • memory/2732-17-0x0000000002190000-0x0000000002196000-memory.dmp

    Filesize

    24KB

  • memory/2732-23-0x0000000002120000-0x0000000002126000-memory.dmp

    Filesize

    24KB

  • memory/4160-0-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/4160-1-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/4160-2-0x0000000003150000-0x0000000003156000-memory.dmp

    Filesize

    24KB