Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 06:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-13_3b9f73c31b4046361e586a1898b5b593_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-13_3b9f73c31b4046361e586a1898b5b593_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-13_3b9f73c31b4046361e586a1898b5b593_cryptolocker.exe
-
Size
70KB
-
MD5
3b9f73c31b4046361e586a1898b5b593
-
SHA1
975d7cfe600ebb117179d7850aeab60566599356
-
SHA256
c1dc972a7ce79be04cc93308489f0e1e20608bf4cbee40a0cdd075d8c9399c7e
-
SHA512
a4b9aad6e8c0aba9e63f881baa4e00f140d7ed624fe9a80fdc6c6668b4a957f540607cf23531ca2b7acad7e3ee60eca40f48fa53cdb5fb5c0b8a5e0303c1adba
-
SSDEEP
768:XS5nQJ24LR1bytOOtEvwDpjNbZ7uyA36S7MpxRXrZSUNsYD/dZ:i5nkFGMOtEvwDpjNbwQEI8UZDj
Malware Config
Signatures
-
Detection of CryptoLocker Variants 4 IoCs
resource yara_rule behavioral2/memory/1168-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral2/files/0x0007000000023276-13.dat CryptoLocker_rule2 behavioral2/memory/1168-18-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral2/memory/4268-26-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 2 IoCs
resource yara_rule behavioral2/memory/1168-18-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral2/memory/4268-26-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 -
Detects executables built or packed with MPress PE compressor 4 IoCs
resource yara_rule behavioral2/memory/1168-0-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x0007000000023276-13.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/1168-18-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/4268-26-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 2024-06-13_3b9f73c31b4046361e586a1898b5b593_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 4268 misid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1168 wrote to memory of 4268 1168 2024-06-13_3b9f73c31b4046361e586a1898b5b593_cryptolocker.exe 82 PID 1168 wrote to memory of 4268 1168 2024-06-13_3b9f73c31b4046361e586a1898b5b593_cryptolocker.exe 82 PID 1168 wrote to memory of 4268 1168 2024-06-13_3b9f73c31b4046361e586a1898b5b593_cryptolocker.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-13_3b9f73c31b4046361e586a1898b5b593_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-13_3b9f73c31b4046361e586a1898b5b593_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:4268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549d193a0dbddcdff10b9f1cbf70d3220
SHA1899d8d9f52fe8edfbc119cea43e531a059b565d4
SHA256f3986b4e95361a44977fd6a182a0c589084214e6c33eb87c9142f9307ba6bb43
SHA512d0745e726cff87b4de2bc7dd1b9a5f085a460cfb5b0d4f9c09e2c94b8fbd9a3a00bae347ec1416b630a1e7a5fa25c44cac8fb2f8a12c8f3d2f41e564ad6e4b69