Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/03/2024, 02:24

General

  • Target

    2024-03-26_031f4da07ee5c365cc8fdcfb543075c2_cryptolocker.exe

  • Size

    34KB

  • MD5

    031f4da07ee5c365cc8fdcfb543075c2

  • SHA1

    294c0c524c23f0fd1722e61ff2142a7b9987adfb

  • SHA256

    494dd97d46f7c8ec68b756c23529c84f0920c6b9fdc6218d1b6990d22ac883c6

  • SHA512

    ef9b3189d1064061e06b07fbc43e55d40cdce91492de16dea3d32f8fdd645db49dfef51a3670819b0454478fd9d5afc2d7d9c0613ca56883090a3a01c5145631

  • SSDEEP

    384:bA74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUr766SJXTQke8SEMMG:bA74zYcgT/Ekd0ryfjQRSNhpSFr

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-26_031f4da07ee5c365cc8fdcfb543075c2_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-26_031f4da07ee5c365cc8fdcfb543075c2_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3452
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    35KB

    MD5

    55e686695ac6e2ceac185d6c9351041a

    SHA1

    41d34cf30369e09e17d8af6f2b2986b705340c68

    SHA256

    e0bbdd2d617669b2415b14a2606a33a0dea76e7ea55c18687d05ea4b844647c6

    SHA512

    9b7aae2988a5c5977952719fcd44ab5d8e730807e8785793593055ca0bba978d2e1d250a97649de49fea4c945be77d765178ecd9ace82d647a20e55240397c96

  • memory/2968-17-0x0000000003010000-0x0000000003016000-memory.dmp

    Filesize

    24KB

  • memory/2968-19-0x0000000002D60000-0x0000000002D66000-memory.dmp

    Filesize

    24KB

  • memory/3452-0-0x0000000002260000-0x0000000002266000-memory.dmp

    Filesize

    24KB

  • memory/3452-1-0x0000000002260000-0x0000000002266000-memory.dmp

    Filesize

    24KB

  • memory/3452-2-0x00000000022D0000-0x00000000022D6000-memory.dmp

    Filesize

    24KB