Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    139s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/01/2024, 08:31

General

  • Target

    2024-01-24_8365e2b7837a9833d4a47063ed7da14f_cryptolocker.exe

  • Size

    123KB

  • MD5

    8365e2b7837a9833d4a47063ed7da14f

  • SHA1

    cbe5ed303145eb0182e25b423dfc549dc5438e20

  • SHA256

    bae430335c05a03a20aa78e174b1655082ee2e269b3b87b124c6e6dc8c9f92ba

  • SHA512

    5e83ff18ec41ff2b6042a167f29e6a4777af0c3c15b58837d4e3dcd6de7c54b4e47b633e27ec5748fee1c544ccd1a0b3a559b10fab8f57f961b80f9980e0e846

  • SSDEEP

    1536:gUj+AIMOtEvwDpjNbwQEIPlemUhYwkkxE4qH:vCA9OtEvwDpjF

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-24_8365e2b7837a9833d4a47063ed7da14f_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-24_8365e2b7837a9833d4a47063ed7da14f_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2972
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies system certificate store
      PID:3084

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    123KB

    MD5

    aab21adf9ab2c301170bff4f84772047

    SHA1

    dcccbd316dcc93a57e7dd3b600cfcf9815a8a5f1

    SHA256

    d613f57ad12e0a6151d14dbc00c48b588f14680cd667242274371096185405c6

    SHA512

    d8a74b9a4dbfdc7abd138b6d0179f8cebe60641b497bcb1370530fe5a5b86cca331d61cb925d83a6c8433eebcc58cd7579299242db1787c3ece081b9b977ab74

  • C:\Users\Admin\AppData\Local\Temp\misids.exe

    Filesize

    315B

    MD5

    a34ac19f4afae63adc5d2f7bc970c07f

    SHA1

    a82190fc530c265aa40a045c21770d967f4767b8

    SHA256

    d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3

    SHA512

    42e53d96e5961e95b7a984d9c9778a1d3bd8ee0c87b8b3b515fa31f67c2d073c8565afc2f4b962c43668c4efa1e478da9bb0ecffa79479c7e880731bc4c55765

  • memory/2972-0-0x00000000005E0000-0x00000000005E6000-memory.dmp

    Filesize

    24KB

  • memory/2972-1-0x00000000005E0000-0x00000000005E6000-memory.dmp

    Filesize

    24KB

  • memory/2972-2-0x0000000000600000-0x0000000000606000-memory.dmp

    Filesize

    24KB

  • memory/3084-19-0x00000000006C0000-0x00000000006C6000-memory.dmp

    Filesize

    24KB

  • memory/3084-17-0x0000000002080000-0x0000000002086000-memory.dmp

    Filesize

    24KB