Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    94s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/09/2024, 12:13

General

  • Target

    2024-09-05_a444daee3a1111cf4f4f01ecf6faa9dd_cryptolocker.exe

  • Size

    63KB

  • MD5

    a444daee3a1111cf4f4f01ecf6faa9dd

  • SHA1

    f5d232a902a63095a3bfd69d8e75ba34b2ba3c76

  • SHA256

    d02fc02255af25b78355424a72fbd0b7e0387ebbb574fdd054726ee4e7697c0f

  • SHA512

    6ff2b41bce00e54e0bffcd6aba2e4cb847ef6a03a18361dd87cdbee8cdad498cd8f56eee8e7f65459d50077e25d94f8b17e90555eab49fbe228c54f99a0a4179

  • SSDEEP

    1536:btB9g/xtCSKfxLIc//Xr+/AO/kIZ3ft2nVuTKB6nggOlHdUHZnTR:btng54SMLr+/AO/kIhfoKMHdat

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-05_a444daee3a1111cf4f4f01ecf6faa9dd_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-05_a444daee3a1111cf4f4f01ecf6faa9dd_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1788
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1424

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\gewos.exe

    Filesize

    63KB

    MD5

    e759489507d7eed5661ecc1d4de232d8

    SHA1

    0e52ecede958276ecb808f4e132c5c3b74552e66

    SHA256

    91efb02cbab34bcae4be109881cd61dba6fcdb9cc456a15fd859765f7f8903aa

    SHA512

    9de61d8e3851eb698c34cb0e35e1b9d9b7cd56999fa2667aa2ea70566b9e8dcfe82ffddc6ea22687f5aee402c3bdefdae54039ab2733a734d7788bac3d2027b0

  • C:\Users\Admin\AppData\Local\Temp\gewosik.exe

    Filesize

    184B

    MD5

    900203dbb2cc962939ac057cd1b389e3

    SHA1

    7018d7bb36f6cfaea49b9292afeeeecc16df82e8

    SHA256

    99d76e4a305596a6356e827a3163dd8842ebf9629444e20e3355798a89a98c75

    SHA512

    3dc07bdf182adc97faf0ff8bfe2fde9845e2d50acf7f3a05fdbd5722755e275ea74b9116bdcac6893ad61866681c68264723b9d104332963241ae6fb436b5512

  • memory/1424-25-0x0000000002D50000-0x0000000002D56000-memory.dmp

    Filesize

    24KB

  • memory/1788-0-0x0000000002340000-0x0000000002346000-memory.dmp

    Filesize

    24KB

  • memory/1788-1-0x0000000002340000-0x0000000002346000-memory.dmp

    Filesize

    24KB

  • memory/1788-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB