Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 12:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-14_0ffc9e071b6f61cf8a6571f8b61459b7_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-14_0ffc9e071b6f61cf8a6571f8b61459b7_cryptolocker.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-14_0ffc9e071b6f61cf8a6571f8b61459b7_cryptolocker.exe
-
Size
40KB
-
MD5
0ffc9e071b6f61cf8a6571f8b61459b7
-
SHA1
26428c6f542a93af5d3238fea33775b0f200d9b0
-
SHA256
c9be42ac696b454d042458a92c90e666ad78ef98c21f726de5aa3ea58b64a274
-
SHA512
62a82afea3af393c26e2e48702d75da2e2d61159a94d285d04847d0a020bfb2359a4c2237e38ec3eed043dbcceb5b8d3b5f101b8dd05cbdac78d500c05a5e64d
-
SSDEEP
768:b/yC4GyNM01GuQMNXw2PSjHPbSuYlW8PAsX:b/pYayGig5HjS3NPAsX
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x00070000000231ea-12.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 2024-02-14_0ffc9e071b6f61cf8a6571f8b61459b7_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 1896 retln.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2284 wrote to memory of 1896 2284 2024-02-14_0ffc9e071b6f61cf8a6571f8b61459b7_cryptolocker.exe 83 PID 2284 wrote to memory of 1896 2284 2024-02-14_0ffc9e071b6f61cf8a6571f8b61459b7_cryptolocker.exe 83 PID 2284 wrote to memory of 1896 2284 2024-02-14_0ffc9e071b6f61cf8a6571f8b61459b7_cryptolocker.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-14_0ffc9e071b6f61cf8a6571f8b61459b7_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-14_0ffc9e071b6f61cf8a6571f8b61459b7_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\retln.exe"C:\Users\Admin\AppData\Local\Temp\retln.exe"2⤵
- Executes dropped EXE
PID:1896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD587293239ab4f5f8462041207efdb261c
SHA1ede15f09f23fff56563e7e8c08b01e5e334f0937
SHA2561c709d530c5ba89c8840ad696c1592bcf007d5db586a92fc206b63a22e9dd973
SHA51295a8fda940a95c3b7d2cb12daa32ebffa22c97bab8db2a6e1766d6d279c6f8ad5fb3b8295eb3ef191b3288f71a15b01a4e11c61aaa7a335ecd91201fdea402aa