Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
23/02/2024, 19:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-23_007cb19c736ee31bf0b12b96454c18a9_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-23_007cb19c736ee31bf0b12b96454c18a9_cryptolocker.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-23_007cb19c736ee31bf0b12b96454c18a9_cryptolocker.exe
-
Size
386KB
-
MD5
007cb19c736ee31bf0b12b96454c18a9
-
SHA1
f66dea71f8a45f5f3a839fab1439deac8dc72a03
-
SHA256
af4c4a6f177d4e1cdbcffd0eba2589ca83c33c9745531ea57c802224a788a40a
-
SHA512
b33519cf8c49bae6ca98f2d8e1dc4551b143037a712acf176b4c404732e7ef9c4690b2b280ae6fbb69126c270793de39a36a972bae126a5f4a7fa9eefd8ef92d
-
SSDEEP
6144:nnOsaQgAOjvrZFODJjBz3j1jTqQy6v2GGnugOtihzX3:nnOflT/ZFIjBz3xjTxynGUOUhX3
Malware Config
Signatures
-
Detection of CryptoLocker Variants 2 IoCs
resource yara_rule behavioral2/files/0x000600000002310d-12.dat CryptoLocker_rule2 behavioral2/files/0x000600000002310d-15.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000\Control Panel\International\Geo\Nation 2024-02-23_007cb19c736ee31bf0b12b96454c18a9_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 3596 hasfj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4000 wrote to memory of 3596 4000 2024-02-23_007cb19c736ee31bf0b12b96454c18a9_cryptolocker.exe 85 PID 4000 wrote to memory of 3596 4000 2024-02-23_007cb19c736ee31bf0b12b96454c18a9_cryptolocker.exe 85 PID 4000 wrote to memory of 3596 4000 2024-02-23_007cb19c736ee31bf0b12b96454c18a9_cryptolocker.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-23_007cb19c736ee31bf0b12b96454c18a9_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-23_007cb19c736ee31bf0b12b96454c18a9_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:3596
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD5436ac649795390fc01c73a6e81aadf88
SHA1c883946f7c0c6a9a2728f4c8ce31750885afeb23
SHA25616de7ea286f1bef1a626818a556104d831d576dd390f354873d52a6799d2c0a5
SHA5122fd742b50a188b57b39c5529f39cd157380a5fc53a7f394e505c7dbf40e4d1be0d826ccb31e56cd7b16ab55d7deeb2a2bfa437f6b4626f0e5cc675814d628fe4
-
Filesize
386KB
MD5f032f308a17fb8abeac9df1010a57c7c
SHA198bca4aa85cdb5d037581a49368d49311e7f2a7d
SHA256f4b0130dc1ba3250c44a85db13b636a6cb5d784a815cab913e7d8bcc6dd9e825
SHA5121f2d30fd3edca2f8ed3ce1c8254a41c347190f69cdba9f170195fba371bad83de65f306dff8a13b290ebb2485f73ec915b14e7bf3d43eac1d15fa6d1a1f0a8a6