Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/05/2024, 16:56

General

  • Target

    2024-05-28_3fefd69d58045de961a247f947030cb6_cryptolocker.exe

  • Size

    37KB

  • MD5

    3fefd69d58045de961a247f947030cb6

  • SHA1

    fd3609e3c4016f34869b848d5ce3f7471d46cc72

  • SHA256

    4022f934e411331c8f8eafb595b68c77a12e59d218468f6874e66eabcafd8ac8

  • SHA512

    e8a951d029341eec8681e7cc587434b38bc8a04fe03f470a8974f30c1ffb191d18889013ff11ae1ee13d44cba6e894318ac89353d337e2d3ba17ef7909c655db

  • SSDEEP

    384:btBYQg/WIEhUCSNyepEjYnDOAlzVol6U/zzo+tkq4XDIwNiJXxXunRSyk:btB9g/WItCSsAGjX7e9N0hunRvk

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-28_3fefd69d58045de961a247f947030cb6_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-28_3fefd69d58045de961a247f947030cb6_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3792
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:3956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\gewos.exe

    Filesize

    37KB

    MD5

    96354ff65bfc584371e9f472f56b84af

    SHA1

    20442c8b1762b2445d867a5fef0f995d3effe7c3

    SHA256

    f8d3fb178a2a2ea7058e05bf0cc351884a3453b56132ff8df8a198df53ea2951

    SHA512

    818718032f2da86ee9bd7e26e7133d629c2f082882df2d3fdf74b33d2c00b6e87f35a409faa3c8b5489cbf8b276995d9c7cc18c5aebee5bb4d53289d29d922c2

  • C:\Users\Admin\AppData\Local\Temp\gewosik.exe

    Filesize

    185B

    MD5

    dcbaf05896d2a767930e381316e87853

    SHA1

    adaabc85bfbaf9cfe3fe77f7723b5e260a27c9e6

    SHA256

    804f2b84aa96f215834e908b6847a7961476029103f290aaa5ba9a6a407fb0ac

    SHA512

    dc29a6d502331919632e0617d2845927524d5bba07a083032053192fc2e149e2205a58c7fd063dc7cdc3d00ba1352f35de513f61cc1839f5c06f91fcf4e332bb

  • memory/3792-0-0x0000000002120000-0x0000000002126000-memory.dmp

    Filesize

    24KB

  • memory/3792-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/3792-8-0x0000000002120000-0x0000000002126000-memory.dmp

    Filesize

    24KB

  • memory/3956-25-0x00000000006F0000-0x00000000006F6000-memory.dmp

    Filesize

    24KB