Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2024, 09:03
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-01_1090360d26072732ac893b6045f3a6e9_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-01_1090360d26072732ac893b6045f3a6e9_cryptolocker.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-01_1090360d26072732ac893b6045f3a6e9_cryptolocker.exe
-
Size
126KB
-
MD5
1090360d26072732ac893b6045f3a6e9
-
SHA1
464022f6d1bbac8637a97efe5e76f4da9177afd5
-
SHA256
2a57393ee6c8be2e6f077f9fcadd9386024fa6371b42e715f459a76dbdc1f49d
-
SHA512
ec5ec095473772f4bb5f013c94eb31777fd908a73c7683d91a769356287d9a9c37b9902e3745d17cfe701c027594153c86e7fa4067ccf1c66d796c5e15281a9d
-
SSDEEP
1536:vj+jsMQMOtEvwDpj5HwYYTjipvF2hBfIuBKLUYOVbvh//K:vCjsIOtEvwDpj5H9YvQd2RQ
Malware Config
Signatures
-
Detection of CryptoLocker Variants 3 IoCs
resource yara_rule behavioral2/files/0x00070000000231f9-12.dat CryptoLocker_rule2 behavioral2/files/0x00070000000231f9-14.dat CryptoLocker_rule2 behavioral2/files/0x00070000000231f9-15.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 3 IoCs
resource yara_rule behavioral2/files/0x00070000000231f9-12.dat CryptoLocker_set1 behavioral2/files/0x00070000000231f9-14.dat CryptoLocker_set1 behavioral2/files/0x00070000000231f9-15.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 2024-02-01_1090360d26072732ac893b6045f3a6e9_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 2020 misid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1340 wrote to memory of 2020 1340 2024-02-01_1090360d26072732ac893b6045f3a6e9_cryptolocker.exe 31 PID 1340 wrote to memory of 2020 1340 2024-02-01_1090360d26072732ac893b6045f3a6e9_cryptolocker.exe 31 PID 1340 wrote to memory of 2020 1340 2024-02-01_1090360d26072732ac893b6045f3a6e9_cryptolocker.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-01_1090360d26072732ac893b6045f3a6e9_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-01_1090360d26072732ac893b6045f3a6e9_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD52f48a912ba52708d11062901eb4c69d0
SHA1b76949fcd8e9ad26116ae6cef02bc6a0beb18917
SHA256aa4a538298bdab3ae2786429cf8d0fdc462bc80a4fd1fc124faaa982c344b2e6
SHA512c995f8d89c50275b12249762d7327f778aeeca7789a002902ed814973915a0200f4363b92ac184c0ee4f23df41792b0035b4425ce6bb759572e1d7c955bd4ebb
-
Filesize
59KB
MD59cd964c28ff85e4a892cd7f05d20f981
SHA12afbc655be67ca97d8cd18b3b1f443d4d8b84124
SHA25633efa8c814a94ef97322f6c49e75ba61c05f8458e6cef1f5af9834a0edf398b0
SHA51262a2fdc59d9eb364597a7f044851362ef2785139578d6305a0866dba6310f208f28f01449870fb1285b0f9a9156d241519a0c891fbceaa9829f66d14e3b01c90
-
Filesize
57KB
MD5adda64a6e60673a2d42acd2974669539
SHA19e612b39bec68e803fc520828b107ddf39060317
SHA2563f5ee6383a6d5845776064e2b52f895af21c87e0cfbb3472012ca2abd41310b2
SHA5122669a3f9c48e8c933bdb2ef3e31981f4cb56bdb18c1f3f89aad9e93f117c6d8c515020eb14cc9be8a2d82ef9f476667e25edad0edb6efcb63488407302f5bce2