Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2024, 17:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-25_5c5b67c45ad05ba269c51984d343c5e6_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-25_5c5b67c45ad05ba269c51984d343c5e6_cryptolocker.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-25_5c5b67c45ad05ba269c51984d343c5e6_cryptolocker.exe
-
Size
126KB
-
MD5
5c5b67c45ad05ba269c51984d343c5e6
-
SHA1
8e3c557118dfc7a5db9f98493709a201bba39f9c
-
SHA256
5a46a60eed59e89f7239e6c2c0429b4076d0d2509f34676798385a85ebbe0199
-
SHA512
a82e9af24a3e5eaacd4d81ae1d4e88430dd09486d6d649e30154da3d5e601ae01a1c9580515006eee4bb9151aab6e5292e80f18d3a751bd4d5cee99eef5b53f3
-
SSDEEP
1536:vj+jsMQMOtEvwDpj5HwYYTjipvF2hBfIuBKLUYOVbvh//jC:vCjsIOtEvwDpj5H9YvQd2Rs
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x000700000002322f-12.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral2/files/0x000700000002322f-12.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-910440534-423636034-2318342392-1000\Control Panel\International\Geo\Nation 2024-02-25_5c5b67c45ad05ba269c51984d343c5e6_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 1972 misid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4328 wrote to memory of 1972 4328 2024-02-25_5c5b67c45ad05ba269c51984d343c5e6_cryptolocker.exe 87 PID 4328 wrote to memory of 1972 4328 2024-02-25_5c5b67c45ad05ba269c51984d343c5e6_cryptolocker.exe 87 PID 4328 wrote to memory of 1972 4328 2024-02-25_5c5b67c45ad05ba269c51984d343c5e6_cryptolocker.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-25_5c5b67c45ad05ba269c51984d343c5e6_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-25_5c5b67c45ad05ba269c51984d343c5e6_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:1972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
126KB
MD587668972303c5b8d1494ec2b63696b0b
SHA1e28b384958bbf04b8489165a5dc8127c8fce1275
SHA25605dae9005e7373b6fab7077d7ec505bbbcf9c55ff7641b046e91f7c9be48d197
SHA5122d9066c3f3d086bfa6090e06942d39e8372a0d451c5992bb2ce255ad1825b753c0c5d11eae6c26035b79bca2765083ec9849bb4c775cc925e485fc4ffaab06b6