Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/04/2024, 01:41

General

  • Target

    2024-04-23_eb05ed08859b8915559f85699fc5f178_cryptolocker.exe

  • Size

    387KB

  • MD5

    eb05ed08859b8915559f85699fc5f178

  • SHA1

    5d959671dfc3a718b788ff24e840a1657e660248

  • SHA256

    39238b1409a9da2cc1996a469337e3f4bd35a746cec4ed5bf298689383fed070

  • SHA512

    1db76240af3b765fb94cbb7c0fdd5e9071bc9383f03c471c1585b9737d56dd384213c097bd1053b1d1daf85dc93cc3171ff87868470f3da6562aac4145de3c72

  • SSDEEP

    6144:nnOsaQgAOjvrZFODJjBz3j1jTqQy6v2GGnugOtihzXF:nnOflT/ZFIjBz3xjTxynGUOUhXF

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-23_eb05ed08859b8915559f85699fc5f178_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-23_eb05ed08859b8915559f85699fc5f178_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1936
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:1056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    388KB

    MD5

    905edf8753b3e8bd68c5cc59fd317389

    SHA1

    3a062f7e64f9ce85a3ec5276e319f3916a515661

    SHA256

    e5a083187b86ca4b9db21de75b29490f97b90ae545d5fdc53ff97a1696aa4575

    SHA512

    1872e064b6df86b82243d37f828c3ef935414a4f69638a7a4d047484fe35aa468cc88783d6cc504ada092884feb08cc3114830dda2bcc51e141f3eae22ef4550

  • memory/1056-17-0x0000000003010000-0x0000000003016000-memory.dmp

    Filesize

    24KB

  • memory/1056-23-0x0000000001F90000-0x0000000001F96000-memory.dmp

    Filesize

    24KB

  • memory/1936-0-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/1936-1-0x0000000002EA0000-0x0000000002EA6000-memory.dmp

    Filesize

    24KB

  • memory/1936-2-0x0000000003150000-0x0000000003156000-memory.dmp

    Filesize

    24KB