Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 09:23
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-09_5cf62fe707503ca3d2548ccd180f7aa0_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-09_5cf62fe707503ca3d2548ccd180f7aa0_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-09_5cf62fe707503ca3d2548ccd180f7aa0_cryptolocker.exe
-
Size
60KB
-
MD5
5cf62fe707503ca3d2548ccd180f7aa0
-
SHA1
aa4830a974886aa6242f129f8c2b8cbfb7229a77
-
SHA256
83d174b8e61792ebf45f7b530f86c7e0b04da27c03dcfd44352624d2d461bd71
-
SHA512
a6e5d2e1f5892fc3da5668af8e3b111d00581676691ee67657f204a484875441be9b0096b7e4a44d274d598993bb8c009d67ba6920c8a34675016b962720c5b2
-
SSDEEP
1536:btB9g/xtCSKfxLIc//Xr+/AO/kIZ3ft2nVuTKB6nggOlHdUHZp:btng54SMLr+/AO/kIhfoKMHdap
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x000e000000023136-12.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation 2024-04-09_5cf62fe707503ca3d2548ccd180f7aa0_cryptolocker.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation gewos.exe -
Executes dropped EXE 1 IoCs
pid Process 908 gewos.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4316 wrote to memory of 908 4316 2024-04-09_5cf62fe707503ca3d2548ccd180f7aa0_cryptolocker.exe 86 PID 4316 wrote to memory of 908 4316 2024-04-09_5cf62fe707503ca3d2548ccd180f7aa0_cryptolocker.exe 86 PID 4316 wrote to memory of 908 4316 2024-04-09_5cf62fe707503ca3d2548ccd180f7aa0_cryptolocker.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-09_5cf62fe707503ca3d2548ccd180f7aa0_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-09_5cf62fe707503ca3d2548ccd180f7aa0_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\gewos.exe"C:\Users\Admin\AppData\Local\Temp\gewos.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5acf515a97aacd64a271508c1a93af02f
SHA1d836f739dba290c2fc8d4c8bcbfda4a4a37bb51d
SHA25603c30dd83ac37c01a093501289c51d3f521addceaaaf6a677d1f8d911a5cdb6b
SHA51209a3cb3f52159a1728391165b5d508c0d747e7b3c438b364225a10d9299ed2115f691c2eee8516eadeca8cb801060c43c776d189d75fa8b3aa09ebe335217aef