Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 04:01 UTC
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-04_ea164475e17a39c62b940c2b6a92dede_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-04_ea164475e17a39c62b940c2b6a92dede_cryptolocker.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-04_ea164475e17a39c62b940c2b6a92dede_cryptolocker.exe
-
Size
119KB
-
MD5
ea164475e17a39c62b940c2b6a92dede
-
SHA1
22a425a51a7b0329546147f581094309b6673494
-
SHA256
96b994a4a2e4d5fc8c9e7ae832d0e5eac4dd56a67f47246406dfbd4b0d4ecea4
-
SHA512
602d7f2b425bdbd07f3b03c307822ae6d33022b3563481461f1adfd06660853c7d8c3a0ac960ba7527a6c6451431377bfae110cf6ba25b7d5ed1d115122f4ba9
-
SSDEEP
768:gUQz7yVEhs9+4T/1bytOOtEvwDpjNbZ7uyA36S7MpxRIIXVe3mU9TYwlOBTq:gUj+AIMOtEvwDpjNbwQEIPlemUhYa
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023226-12.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023226-12.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 2024-02-04_ea164475e17a39c62b940c2b6a92dede_cryptolocker.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation misid.exe -
Executes dropped EXE 1 IoCs
pid Process 3212 misid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2376 wrote to memory of 3212 2376 2024-02-04_ea164475e17a39c62b940c2b6a92dede_cryptolocker.exe 36 PID 2376 wrote to memory of 3212 2376 2024-02-04_ea164475e17a39c62b940c2b6a92dede_cryptolocker.exe 36 PID 2376 wrote to memory of 3212 2376 2024-02-04_ea164475e17a39c62b940c2b6a92dede_cryptolocker.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-04_ea164475e17a39c62b940c2b6a92dede_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-04_ea164475e17a39c62b940c2b6a92dede_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:3212
-
Network
-
Remote address:8.8.8.8:53Request13.86.106.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestbestccc.comIN AResponsebestccc.comIN A103.14.121.240
-
Remote address:103.14.121.240:443RequestGET /hr/ho2.exe HTTP/1.1
Accept: text/*, application/*
User-Agent: Updates downloader
Host: bestccc.com
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Content-Type: application/octet-stream
Transfer-Encoding: chunked
Connection: close
Server: imunify360-webshield/1.21
Last-Modified: Sunday, 04-Feb-2024 04:01:33 GMT
Cache-Control: private, no-store, no-cache, must-revalidate, proxy-revalidate, max-age=0, s-maxage=0
cf-edge-cache: no-cache
-
Remote address:8.8.8.8:53Request0.205.248.87.in-addr.arpaIN PTRResponse0.205.248.87.in-addr.arpaIN PTRhttps-87-248-205-0lgwllnwnet
-
Remote address:8.8.8.8:53Request74.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestcrl.comodoca.comIN AResponsecrl.comodoca.comIN CNAMEcrl.comodoca.com.cdn.cloudflare.netcrl.comodoca.com.cdn.cloudflare.netIN A104.18.38.233crl.comodoca.com.cdn.cloudflare.netIN A172.64.149.23
-
Remote address:104.18.38.233:80RequestGET /cPanelIncCertificationAuthority.crl HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/10.0
Host: crl.comodoca.com
ResponseHTTP/1.1 200 OK
Content-Type: application/pkix-crl
Content-Length: 60142
Connection: keep-alive
Last-Modified: Sat, 03 Feb 2024 13:56:59 GMT
ETag: "65be462b-eaee"
X-CCACDN-Mirror-ID: sscrl1
Cache-Control: max-age=14400, s-maxage=3600
Expires: Sat, 10 Feb 2024 13:56:59 GMT
X-CCACDN-Proxy-ID: mcdpinlb1
X-Frame-Options: SAMEORIGIN
CF-Cache-Status: HIT
Age: 383
Accept-Ranges: bytes
Server: cloudflare
CF-RAY: 8500040bc91148c1-LHR
-
Remote address:8.8.8.8:53Request240.121.14.103.in-addr.arpaIN PTRResponse240.121.14.103.in-addr.arpaIN PTR10314121240-static-reversegooddomainregistrycom
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request23.149.64.172.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request149.220.183.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request233.38.18.104.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request196.249.167.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request157.123.68.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request15.164.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.134.221.88.in-addr.arpaIN PTRResponse18.134.221.88.in-addr.arpaIN PTRa88-221-134-18deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request173.178.17.96.in-addr.arpaIN PTRResponse173.178.17.96.in-addr.arpaIN PTRa96-17-178-173deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request29.243.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request211.143.182.52.in-addr.arpaIN PTRResponse
-
1.0kB 4.1kB 13 9
HTTP Request
GET https://bestccc.com/hr/ho2.exeHTTP Response
200 -
1.4kB 62.5kB 27 47
HTTP Request
GET http://crl.comodoca.com/cPanelIncCertificationAuthority.crlHTTP Response
200
-
71 B 157 B 1 1
DNS Request
13.86.106.20.in-addr.arpa
-
57 B 73 B 1 1
DNS Request
bestccc.com
DNS Response
103.14.121.240
-
71 B 116 B 1 1
DNS Request
0.205.248.87.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
74.32.126.40.in-addr.arpa
-
62 B 143 B 1 1
DNS Request
crl.comodoca.com
DNS Response
104.18.38.233172.64.149.23
-
73 B 139 B 1 1
DNS Request
240.121.14.103.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
72 B 134 B 1 1
DNS Request
23.149.64.172.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
149.220.183.52.in-addr.arpa
-
72 B 134 B 1 1
DNS Request
233.38.18.104.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
196.249.167.52.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
157.123.68.40.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
15.164.165.52.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
18.134.221.88.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
173.178.17.96.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
29.243.111.52.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
211.143.182.52.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
119KB
MD5d99b27b0d313f75083c0909769efd3e7
SHA1150eaf81dbd833214e7bee87ede2e2e8cef83b23
SHA25693b453dda6b8ddf00d644f00ede8a9821ceff9ecff1e450b15bf9f3791198e77
SHA5129ce8215fa2bca5bd3bc389ba98687cca5216aac072f5cdef795e509db959562960d4ddd26bbbae25e0ae8605a4de11d1e379ae7200295ebbbf7ec89220559d09