Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 02:31
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-18_4c26bcb7d44cb55c76403d00de47a348_cryptolocker.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-10-18_4c26bcb7d44cb55c76403d00de47a348_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-18_4c26bcb7d44cb55c76403d00de47a348_cryptolocker.exe
-
Size
34KB
-
MD5
4c26bcb7d44cb55c76403d00de47a348
-
SHA1
61213cd1d0b67b9003fd3f72482d4f6a1f456baa
-
SHA256
7502db8d32a964e9818fe64cd4c85f08dbc3847c1cd8666e421ad2c496083003
-
SHA512
73d634dcd5f4860ce3217d5255c29533598bfb8b60e724733a766689812cfa200caba4837ebfd77c1a39756d49309e0eb5a7d0a1d0dda53ac5398df5e73c37d5
-
SSDEEP
768:bxNQIE0eBhkL2Fo1CCwgfjOg1tsJ6zeen754X:bxNrC7kYo1Fxf3s052
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 2024-10-18_4c26bcb7d44cb55c76403d00de47a348_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 4760 pissa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-18_4c26bcb7d44cb55c76403d00de47a348_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pissa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4080 wrote to memory of 4760 4080 2024-10-18_4c26bcb7d44cb55c76403d00de47a348_cryptolocker.exe 86 PID 4080 wrote to memory of 4760 4080 2024-10-18_4c26bcb7d44cb55c76403d00de47a348_cryptolocker.exe 86 PID 4080 wrote to memory of 4760 4080 2024-10-18_4c26bcb7d44cb55c76403d00de47a348_cryptolocker.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-18_4c26bcb7d44cb55c76403d00de47a348_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-18_4c26bcb7d44cb55c76403d00de47a348_cryptolocker.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\pissa.exe"C:\Users\Admin\AppData\Local\Temp\pissa.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5270ea3418e9bcf79de2bd1a801889291
SHA1ee473125ca45b0b7c8926cb0c4a5f4ca8539d376
SHA2565a3151a0e6a7144ba3bc422bd53cbf7dbbbaae4b3518a708ffe991043c618d5f
SHA512dc3d3f49d595cb6b9ae9f30a6f1d4eec95feb3beb50b1ed6f369caccfd7c488053b9012bff15ce139712be44fee2d8c95f12b12a59c89d7d6f47ee3b31fd560e