Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
130s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 04:34
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-07_6a35618299e4d998979dfd79e132feef_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-05-07_6a35618299e4d998979dfd79e132feef_cryptolocker.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-05-07_6a35618299e4d998979dfd79e132feef_cryptolocker.exe
-
Size
43KB
-
MD5
6a35618299e4d998979dfd79e132feef
-
SHA1
1b77947f1b5165c72298550091213ea779fc2924
-
SHA256
c1e6d1c997989936afe1a8104f1b79e73754230e4a94f19d8ea3de0b491a1a4f
-
SHA512
4441e9c7d0b9a2945a02dec36700a0d8fc671e898eeb6ba49e73c167ac6febfd4249540be08fd325c0e706a78c563a806a4d28597a59d38bc3d1e3398c5fc185
-
SSDEEP
768:bAvJCYOOvbRPDEgXrNekd7l94i3p+kfRh:bAvJCF+RQgJeab4sB3
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x000d000000023b24-12.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation 2024-05-07_6a35618299e4d998979dfd79e132feef_cryptolocker.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation demka.exe -
Executes dropped EXE 1 IoCs
pid Process 804 demka.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 712 wrote to memory of 804 712 2024-05-07_6a35618299e4d998979dfd79e132feef_cryptolocker.exe 83 PID 712 wrote to memory of 804 712 2024-05-07_6a35618299e4d998979dfd79e132feef_cryptolocker.exe 83 PID 712 wrote to memory of 804 712 2024-05-07_6a35618299e4d998979dfd79e132feef_cryptolocker.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-07_6a35618299e4d998979dfd79e132feef_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-07_6a35618299e4d998979dfd79e132feef_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Users\Admin\AppData\Local\Temp\demka.exe"C:\Users\Admin\AppData\Local\Temp\demka.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD586ddb9826ed35c68c2e430c368b0b014
SHA14a36a01f0410f9e5deb857d8fcc5e42360e9e28e
SHA2569a700d57aba31ad820102dc46b3ee071de1c255ae4608b6177002d06edc0b498
SHA512f9b6816272c753460b42066d535f61baea5b5068fbb46c59c0a40edaa77d9eb1dc85dbb6b5698136b95ebec48387d0dcea204419d7e508a001928053b38ed270
-
Filesize
186B
MD5b27a70502535ee8b0d6d4672b5ec16a5
SHA16588a831754da565600d61b7521b51c0acd52e80
SHA256893d7cd6dca180eb9e66b223ed22f81d7c4327ea336a98a971956ba9f13c9951
SHA512c4d375e07741fd37066e1e71a3200d2428422b9c90695e7cc5aa7a60c4cb5410566a8a12e26ba276edcb1ca1ade199babd5675adee79b27cdb930b9ca8629a0a