Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 03:50
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-24_c70e895af61d7949c473e98c873c5467_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-24_c70e895af61d7949c473e98c873c5467_cryptolocker.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-24_c70e895af61d7949c473e98c873c5467_cryptolocker.exe
-
Size
69KB
-
MD5
c70e895af61d7949c473e98c873c5467
-
SHA1
226156d1ef585525ef3fa78c40dc616a4c0534fd
-
SHA256
5cdce65894db27730ccb18153230a0c0a650d7d8d894d3596bfb8e89a591753e
-
SHA512
f92d209ec1ff53709cc673a08ee5f3589342636ee696a36fccae9fc614105a9b082692e3f56d68b2c5e4d42bf6cf523c455d47cc79f2533114ed8da6b4035427
-
SSDEEP
1536:Dk/xY0sllyGQMOtEvwDpjwycDtKkQZQRKb61vSbgZ3QzNKUf:DW60sllyWOtEvwDpjwF85R
Malware Config
Signatures
-
Detection of CryptoLocker Variants 3 IoCs
resource yara_rule behavioral2/memory/1840-0-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 behavioral2/files/0x000600000002321a-13.dat CryptoLocker_rule2 behavioral2/memory/1840-17-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 3 IoCs
resource yara_rule behavioral2/memory/1840-0-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 behavioral2/files/0x000600000002321a-13.dat CryptoLocker_set1 behavioral2/memory/1840-17-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1414748551-1520717498-2956787782-1000\Control Panel\International\Geo\Nation 2024-02-24_c70e895af61d7949c473e98c873c5467_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 4756 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1840 wrote to memory of 4756 1840 2024-02-24_c70e895af61d7949c473e98c873c5467_cryptolocker.exe 90 PID 1840 wrote to memory of 4756 1840 2024-02-24_c70e895af61d7949c473e98c873c5467_cryptolocker.exe 90 PID 1840 wrote to memory of 4756 1840 2024-02-24_c70e895af61d7949c473e98c873c5467_cryptolocker.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-24_c70e895af61d7949c473e98c873c5467_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-24_c70e895af61d7949c473e98c873c5467_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:4756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69KB
MD5b9465767a2564143a0ec674fd35f3088
SHA18eb30c9dcc186ec88ef2201fc2fdbbb9939db630
SHA256f4e988ea0597564f9561cabf05faf18a69455ecbe9a5579070d07d790a8d763a
SHA512a752ce77d75fcfe1437eeb805ddb4aa6e6e7ec0861e157808fce602552a1aa3abedc7f139f5a50b64cc03cb91cbf2bc45c70e93d609cac1133642adc9379d632