Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
88s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 15:49
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-25_c7e0e307a04026b8bf6e5e565382ee9a_cryptolocker.exe
Resource
win7-20231215-en
General
-
Target
2024-01-25_c7e0e307a04026b8bf6e5e565382ee9a_cryptolocker.exe
-
Size
39KB
-
MD5
c7e0e307a04026b8bf6e5e565382ee9a
-
SHA1
3f99aefbf7cde172dfd6a13a979eb0c124a42e3c
-
SHA256
cf92f67b4040534ce870d067b805bc164dea5dfd0a700eab540fbc6a98733c00
-
SHA512
168697b46b8e0d9c1841f2ea15afb6390c4c2e65481c032f28c2862fd6c9273840c0416fb1f58b225aa50c666b3a4d56133b642156272c3bf6c625a58cbab188
-
SSDEEP
768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjLenQL3bTY:ZzFbxmLPWQMOtEvwDpjLeU3w
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x0010000000023155-13.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 2024-01-25_c7e0e307a04026b8bf6e5e565382ee9a_cryptolocker.exe Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation misid.exe -
Executes dropped EXE 1 IoCs
pid Process 1484 misid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 684 wrote to memory of 1484 684 2024-01-25_c7e0e307a04026b8bf6e5e565382ee9a_cryptolocker.exe 88 PID 684 wrote to memory of 1484 684 2024-01-25_c7e0e307a04026b8bf6e5e565382ee9a_cryptolocker.exe 88 PID 684 wrote to memory of 1484 684 2024-01-25_c7e0e307a04026b8bf6e5e565382ee9a_cryptolocker.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_c7e0e307a04026b8bf6e5e565382ee9a_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_c7e0e307a04026b8bf6e5e565382ee9a_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:1484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD529cb4110d64bcac2aee9e48ca8752fb2
SHA1f9568f3873dc2e144d5accdd11ade255a30a8a6b
SHA256294d90a77bc3289bdf7ad726153439be0fa91a249e2a8f6d9c4e75566e99bfee
SHA512b5f3d4f8587a9e2eacb6346dde2e5c53c545430faf2594e878a3527dc64d32204aaabb2f0aea7de51c7668311024289a3785439cb07c3015be3a0e563ab00294