Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/05/2024, 23:25

General

  • Target

    2024-05-20_2527b863481b5a4d7d2af6613781ba03_cryptolocker.exe

  • Size

    62KB

  • MD5

    2527b863481b5a4d7d2af6613781ba03

  • SHA1

    3583cb56b03be1b3599ffd4540afffc8cf661f09

  • SHA256

    334b745fef48fa6af9f83c9420766f7f46226c45a40fd42a195065433d66c594

  • SHA512

    ddab9925057ee44a1903c61d0a3f48432f0801ea31bd735bc3cf20036c91abe317a51c6f6ee8d15fb872e7c0dd6f7cbebd5eccbcf058bdd3d080f0994ceabf71

  • SSDEEP

    1536:btB9g/xtCSKfxLIc//Xr+/AO/kIZ3ft2nVuTKB6nggOlHdUHZnF7H6:btng54SMLr+/AO/kIhfoKMHdaw

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-20_2527b863481b5a4d7d2af6613781ba03_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-20_2527b863481b5a4d7d2af6613781ba03_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4776
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:2696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\gewos.exe

    Filesize

    63KB

    MD5

    227186b1239180f884cb93f25949c919

    SHA1

    0055d343d65c8cfbc5dd6284beb94f09fa627649

    SHA256

    c2c47b2d1d0d80fd22c71fd789c6c3a936627ecafd192668e06bd91ebfa25c17

    SHA512

    67feebef9fd9d7900fbf97cbb786b9ed53df9d9ab206d76e4dac770a03606da0792e323eafd4a8fc1cfa36d549d11f78554b2e421ddd656cbe1ce168a364924c

  • C:\Users\Admin\AppData\Local\Temp\gewosik.exe

    Filesize

    185B

    MD5

    9a70b115419bb7c08aa9e21edccfcb6d

    SHA1

    ae95273e7e74c220cb183cb2ffa1b9016ca75e0a

    SHA256

    2fac21de79a635d260b8ec9e6dff20830afb915f7a2bd60c5ab8a3d1085f4521

    SHA512

    584075b6eda5329304cc900a7c53862b97bb19fad40b96f0c16861c3b3513eb189f32cf4e8e756d578f8f2235d02471ad4f5f96e03704b7e6243491a96203f58

  • memory/2696-25-0x0000000001F90000-0x0000000001F96000-memory.dmp

    Filesize

    24KB

  • memory/4776-0-0x00000000021E0000-0x00000000021E6000-memory.dmp

    Filesize

    24KB

  • memory/4776-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/4776-8-0x00000000021E0000-0x00000000021E6000-memory.dmp

    Filesize

    24KB