Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/02/2024, 06:18

General

  • Target

    2024-02-13_e89684773dac8e44cb7877d898180ccc_cryptolocker.exe

  • Size

    32KB

  • MD5

    e89684773dac8e44cb7877d898180ccc

  • SHA1

    fc630ea8b83d82ed875630ac7166fb0e4ff2cab1

  • SHA256

    8fda2809fc48987b3ef38f9abb63301c8969e67668594d4632172bbf8b65cd46

  • SHA512

    d27987f629388bb09ddfb32122a7956c47690d149c447fd6d7e1f0e4f67527d32a2363a987f7bbf5fc61686d6b2c4e1f07130fea5690dd38beab75427d6e2ae1

  • SSDEEP

    384:bA74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUr766SJXTQke8S4N6:bA74zYcgT/Ekd0ryfjQRSNhpSx

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-13_e89684773dac8e44cb7877d898180ccc_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-13_e89684773dac8e44cb7877d898180ccc_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:752
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:4108

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    32KB

    MD5

    89a8d4ed3c85a978138bd1bbcd125a94

    SHA1

    b66decd14ceac0528b4e9734fe0cd4556fcaa817

    SHA256

    b18847c1bda6a4886e8e990a6bc4eef2a7b071ff2f0540078f3145bb6037aca4

    SHA512

    2233ea474a02c9afab4172985ff18e34ce548431f77b2329ced066d6259e59f518e2f2339e36a7a1e28a9b796a4ff37a89d56f1512a33b1fc8529d18a15ff75c

  • memory/752-0-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/752-1-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/752-2-0x0000000003150000-0x0000000003156000-memory.dmp

    Filesize

    24KB

  • memory/4108-17-0x0000000002240000-0x0000000002246000-memory.dmp

    Filesize

    24KB

  • memory/4108-19-0x0000000002210000-0x0000000002216000-memory.dmp

    Filesize

    24KB