Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/02/2024, 15:32

General

  • Target

    2024-02-01_aef2724d8f52bc3d3655730e775c982d_cryptolocker.exe

  • Size

    28KB

  • MD5

    aef2724d8f52bc3d3655730e775c982d

  • SHA1

    a39706570d07cdaae7cf8aa7c2679dd811c2b9be

  • SHA256

    0276f85806f2e9dc7e5560f46450b51d6c0f08a217a28272e94814b465f24b31

  • SHA512

    a1412bbcb52caae0a05ba43cd61630f2b808bb22eef6fdfbdb7211d02daaf6de6d081dce61049ffad2b2037516efeba8f84b0aec8cfab2ab1b3b9d1d768eb4b0

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+/:q0zizzOSxMOtEvwDpj/arZ

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 3 IoCs
  • UPX dump on OEP (original entry point) 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-01_aef2724d8f52bc3d3655730e775c982d_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-01_aef2724d8f52bc3d3655730e775c982d_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:932
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    28KB

    MD5

    914d1f5ab49682499872be5f0e1c3833

    SHA1

    0a43448aa7a40ebf05eb8dc2d5d9064b416c35f9

    SHA256

    db38c95885cccfae6075cf051fa85669994d5d458176655784e539007e77dad4

    SHA512

    57bf819f67866d2d864564e90e0c32098ebd50b3efd908a1851b4d9d54e647ec82e0b651324bf957440946a26a51fc5a14a63ce545a2d88b1eb096e43f6df913

  • memory/812-18-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/812-22-0x0000000000660000-0x0000000000666000-memory.dmp

    Filesize

    24KB

  • memory/812-20-0x0000000000680000-0x0000000000686000-memory.dmp

    Filesize

    24KB

  • memory/812-27-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/932-0-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/932-1-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/932-2-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/932-3-0x0000000000860000-0x0000000000866000-memory.dmp

    Filesize

    24KB

  • memory/932-17-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB