Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/02/2024, 19:25

General

  • Target

    2024-02-23_007cb19c736ee31bf0b12b96454c18a9_cryptolocker.exe

  • Size

    386KB

  • MD5

    007cb19c736ee31bf0b12b96454c18a9

  • SHA1

    f66dea71f8a45f5f3a839fab1439deac8dc72a03

  • SHA256

    af4c4a6f177d4e1cdbcffd0eba2589ca83c33c9745531ea57c802224a788a40a

  • SHA512

    b33519cf8c49bae6ca98f2d8e1dc4551b143037a712acf176b4c404732e7ef9c4690b2b280ae6fbb69126c270793de39a36a972bae126a5f4a7fa9eefd8ef92d

  • SSDEEP

    6144:nnOsaQgAOjvrZFODJjBz3j1jTqQy6v2GGnugOtihzX3:nnOflT/ZFIjBz3xjTxynGUOUhX3

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-23_007cb19c736ee31bf0b12b96454c18a9_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-23_007cb19c736ee31bf0b12b96454c18a9_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4000
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:3596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    284KB

    MD5

    436ac649795390fc01c73a6e81aadf88

    SHA1

    c883946f7c0c6a9a2728f4c8ce31750885afeb23

    SHA256

    16de7ea286f1bef1a626818a556104d831d576dd390f354873d52a6799d2c0a5

    SHA512

    2fd742b50a188b57b39c5529f39cd157380a5fc53a7f394e505c7dbf40e4d1be0d826ccb31e56cd7b16ab55d7deeb2a2bfa437f6b4626f0e5cc675814d628fe4

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    386KB

    MD5

    f032f308a17fb8abeac9df1010a57c7c

    SHA1

    98bca4aa85cdb5d037581a49368d49311e7f2a7d

    SHA256

    f4b0130dc1ba3250c44a85db13b636a6cb5d784a815cab913e7d8bcc6dd9e825

    SHA512

    1f2d30fd3edca2f8ed3ce1c8254a41c347190f69cdba9f170195fba371bad83de65f306dff8a13b290ebb2485f73ec915b14e7bf3d43eac1d15fa6d1a1f0a8a6

  • memory/3596-17-0x00000000006F0000-0x00000000006F6000-memory.dmp

    Filesize

    24KB

  • memory/3596-18-0x0000000000720000-0x0000000000726000-memory.dmp

    Filesize

    24KB

  • memory/4000-0-0x0000000002350000-0x0000000002356000-memory.dmp

    Filesize

    24KB

  • memory/4000-1-0x0000000002350000-0x0000000002356000-memory.dmp

    Filesize

    24KB

  • memory/4000-2-0x0000000002400000-0x0000000002406000-memory.dmp

    Filesize

    24KB