Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2024, 23:47
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-26_b3b374d924d026ef0aa83e2a9859556c_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-03-26_b3b374d924d026ef0aa83e2a9859556c_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-26_b3b374d924d026ef0aa83e2a9859556c_cryptolocker.exe
-
Size
33KB
-
MD5
b3b374d924d026ef0aa83e2a9859556c
-
SHA1
4354ae36f6d8ad42c4258dc039bfcf33e8a792cf
-
SHA256
86571e3a12f4369c32db5c276d245d10533f0d27a3125d5f20fac5de6bdb7db7
-
SHA512
885b0d5a3f513ecd84c3d0e2cfaa67ac1527f90434cef89886a1bce4e6144e66ccd4ba51663f2bcd2df354d20a0b6bfa2096829f5b0403eb0948423c37a7ed4b
-
SSDEEP
384:bA74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUgIunvsYo83:bA74zYcgT/Ekd0ryfjPIunvsi3
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x0008000000022745-12.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation 2024-03-26_b3b374d924d026ef0aa83e2a9859556c_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 2960 hasfj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1116 wrote to memory of 2960 1116 2024-03-26_b3b374d924d026ef0aa83e2a9859556c_cryptolocker.exe 91 PID 1116 wrote to memory of 2960 1116 2024-03-26_b3b374d924d026ef0aa83e2a9859556c_cryptolocker.exe 91 PID 1116 wrote to memory of 2960 1116 2024-03-26_b3b374d924d026ef0aa83e2a9859556c_cryptolocker.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-26_b3b374d924d026ef0aa83e2a9859556c_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-26_b3b374d924d026ef0aa83e2a9859556c_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD59f7d3b03d73a42f29e70d3ce0a4657d7
SHA1dcbbf814cdbb533878e393c12d67e44e3432ba51
SHA256c11c038bf6bf7c61f89d9b3e8cf2510143fadfedd7c60121424d7c709bd78a0b
SHA5126c4bfb5dfce4a195c23c0dff70fc02b8ff59e9c02c9e95442e2e280dc445d2e3df8f41daf5ce0ea415d32c4150750ad9669268153b151afab82d0e6c8774f38c