Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/02/2024, 23:31

General

  • Target

    2024-02-01_be0a45bc4eb66a157c79d8ca25c6e130_cryptolocker.exe

  • Size

    41KB

  • MD5

    be0a45bc4eb66a157c79d8ca25c6e130

  • SHA1

    6c3196a6f6e2fbc84baddc6917e910538622d5d5

  • SHA256

    02c073271e52a32d0dd195cddf65ba1648376d7badcb7b331343c8cc3305e671

  • SHA512

    9c3e09d5f82b5f0ec79b1f8e81a87b00f29d66c40fe5cfb85b34feea94aa617527b90dc3ccf4c86b10b94257b89512c3ad57a7f8a2efec3a156df30340d58a8f

  • SSDEEP

    768:b7o/2n1TCraU6GD1a4X0WcO+wMVm+slAMRqyQ:bc/y2lkF0+Bjv

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-01_be0a45bc4eb66a157c79d8ca25c6e130_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-01_be0a45bc4eb66a157c79d8ca25c6e130_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4496
    • C:\Users\Admin\AppData\Local\Temp\rewok.exe
      "C:\Users\Admin\AppData\Local\Temp\rewok.exe"
      2⤵
      • Executes dropped EXE
      PID:4524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rewok.exe

    Filesize

    41KB

    MD5

    6a53207bdb75b1bc1054651db4b68580

    SHA1

    b1b87e433e3c3f388dcff147bc63d54cc22976f6

    SHA256

    c2244b8853b997e83a03ec6da099fa7eef3bc7a3686f4d492a6cb7cfeb07304e

    SHA512

    969fcaf2d33e8eedfa380a4123ce7a9199f2bc5b097cb0a52760f7510fde013b0444c440dd13619d75740e0d9b361f17bbc6c567d7ca8f9b250ae6a186de0aa4

  • memory/4496-0-0x00000000022D0000-0x00000000022D6000-memory.dmp

    Filesize

    24KB

  • memory/4496-1-0x00000000022D0000-0x00000000022D6000-memory.dmp

    Filesize

    24KB

  • memory/4496-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/4524-20-0x0000000002120000-0x0000000002126000-memory.dmp

    Filesize

    24KB