Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/02/2024, 13:30

General

  • Target

    2024-02-20_9d6f15d53abf434fa5093f3dc850b5a9_cryptolocker.exe

  • Size

    30KB

  • MD5

    9d6f15d53abf434fa5093f3dc850b5a9

  • SHA1

    a1b76c32dac9a6d354987c708281a71e3a71809e

  • SHA256

    addbad17f2770f8e329f562af0a1722de029d8098aa3fb4fadeacc9ba6f535f0

  • SHA512

    e429d4c8b7e83200a7cea4501d08203a6dc254f517cdffb601a3a0395d43130b71b61af6ddb8704396c39e93818dcce42a3deee99333b098131234a57f5c6559

  • SSDEEP

    384:bA74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUr766SJ5STV9Zv:bA74zYcgT/Ekd0ryfjQRSnWV9B

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-20_9d6f15d53abf434fa5093f3dc850b5a9_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-20_9d6f15d53abf434fa5093f3dc850b5a9_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3332
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:1820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    30KB

    MD5

    9ee846b81b6d65578decdde69d1f0c80

    SHA1

    3487a5f75e39739623d2b1a49327cdadadf78ea2

    SHA256

    8d3084c89705a6880e5926780c83f9cb85afa6a44d43c09d67a8b191587495fb

    SHA512

    2a1a0c52ca9ef54849a95694e73774d026f2970a049ae7d8070128995e46894e46e6bebc8624946cbaa7d174f8109b4103431595276b5d1a8817ccfa9570b520

  • memory/1820-17-0x00000000021D0000-0x00000000021D6000-memory.dmp

    Filesize

    24KB

  • memory/1820-23-0x0000000002110000-0x0000000002116000-memory.dmp

    Filesize

    24KB

  • memory/3332-0-0x0000000002260000-0x0000000002266000-memory.dmp

    Filesize

    24KB

  • memory/3332-1-0x0000000002260000-0x0000000002266000-memory.dmp

    Filesize

    24KB

  • memory/3332-2-0x00000000022D0000-0x00000000022D6000-memory.dmp

    Filesize

    24KB