Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 03:51
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-04_df6acd04740b63d32819dd1cc1081032_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-04_df6acd04740b63d32819dd1cc1081032_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-04_df6acd04740b63d32819dd1cc1081032_cryptolocker.exe
-
Size
47KB
-
MD5
df6acd04740b63d32819dd1cc1081032
-
SHA1
8dba58b7098b1b11561f6e15d84f11224f8b24ee
-
SHA256
f4963b241c6190ec2368a7f841c38f31966ead7f43209d67a186a5027f623cba
-
SHA512
baf58c7561fa2594657964ac7edde5eb783c65124a430ccb96052815da68b90ef6a9d4b9a121393beada78e802ed771f1925391ffbae65d85e02ca8843f1a56b
-
SSDEEP
768:P6LsoEEeegiZPvEhHS5+Mh/QtOOtEvwDpjBpaD3TUogs/VXpAPlAW:P6QFElP6k+MRQMOtEvwDpjBQpVX8AW
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation 2024-10-04_df6acd04740b63d32819dd1cc1081032_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 2008 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-04_df6acd04740b63d32819dd1cc1081032_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5036 wrote to memory of 2008 5036 2024-10-04_df6acd04740b63d32819dd1cc1081032_cryptolocker.exe 82 PID 5036 wrote to memory of 2008 5036 2024-10-04_df6acd04740b63d32819dd1cc1081032_cryptolocker.exe 82 PID 5036 wrote to memory of 2008 5036 2024-10-04_df6acd04740b63d32819dd1cc1081032_cryptolocker.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-04_df6acd04740b63d32819dd1cc1081032_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-04_df6acd04740b63d32819dd1cc1081032_cryptolocker.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD516f53abe0d93d89a9e79b49f9506580e
SHA1db39f9f1e7de84e6b9cd60f960c3aa7418c7873e
SHA2564dab68aabfe5d51135c91092880e54d14735aa8bbb44a09a7c64c2a8ac175ddd
SHA51271ef2836d852754f44b48004e3ffd5db18c7938334b58208bc10588b534332b9b81a4a1c3f026f6d4063d187f6d7390ec1098d015fb473945b6787cda57eb8dc