Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    94s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/02/2024, 05:54

General

  • Target

    2024-02-19_e1c3cda70cc6533feb72de4d729baaf0_cryptolocker.exe

  • Size

    36KB

  • MD5

    e1c3cda70cc6533feb72de4d729baaf0

  • SHA1

    69de7857e3f52be27953517e2c84597baae86b98

  • SHA256

    45a647161750a5d17d7128011f9c456ce3118960c5d2630d1e0f6f1c7f6fdd7b

  • SHA512

    4ff9faa917512c25e5ab18bb2cbe7171240496ec5d619baf5afaf9f095d272da53ee4e54cc43c1fd7afff2bca1f01622f715b5e82cf84035062f3a6656c7d228

  • SSDEEP

    384:btBYQg/WIEhUCSNyepEjYnDOAlzVol6U/zzo+tkq4XDIwNiJXxXunKU4:btB9g/WItCSsAGjX7e9N0hunKU4

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-19_e1c3cda70cc6533feb72de4d729baaf0_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-19_e1c3cda70cc6533feb72de4d729baaf0_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4364
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:4428

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\gewos.exe

    Filesize

    36KB

    MD5

    c128a2a1c47ce4abc130e8643e9d48e4

    SHA1

    f522d446032ba9002662e65d3bbd8fa8efccce33

    SHA256

    78fe24daa925d68fc6e4fbecc3f391beeb901b9c1c2147a923742f9950580374

    SHA512

    223226ae5e4181ffa59589c83e2279381bedf56404fb9932ba67d368792807aeb60f416199c63c1b5741c3c1fb36d0e00bb289197ec35e5ef159f7539b6e0e5a

  • memory/4364-0-0x00000000022C0000-0x00000000022C6000-memory.dmp

    Filesize

    24KB

  • memory/4364-1-0x00000000022C0000-0x00000000022C6000-memory.dmp

    Filesize

    24KB

  • memory/4364-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/4428-22-0x0000000000600000-0x0000000000606000-memory.dmp

    Filesize

    24KB