Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    134s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/02/2024, 20:45

General

  • Target

    2024-02-17_cd80cd90ea5ec2e8bc19304ef9e90738_cryptolocker.exe

  • Size

    35KB

  • MD5

    cd80cd90ea5ec2e8bc19304ef9e90738

  • SHA1

    c4396ab3c30429b417e9fa7524ed3cf5bd208b13

  • SHA256

    57791ed234d7b3e1e39ffa9408c775018d750d2b0db45fc688b21710498ba176

  • SHA512

    8f41ba70c8d128cd91ddd36905e296dc62de1e6c6d7cc0f2f81b51e2b64d4eb0be758bd85b39b7bdb0ecbc42cb9df19252f8c2f8fd2e5968d28f08fe7441bca1

  • SSDEEP

    768:wHGGaSawqnwjRQ6ESlmFOsPoOdQtOOtEvwDpjm6WaJIOc+UPPEkLK:YGzl5wjRQBBOsP1QMOtEvwDpjgarrkLK

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 3 IoCs
  • Detection of Cryptolocker Samples 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-17_cd80cd90ea5ec2e8bc19304ef9e90738_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-17_cd80cd90ea5ec2e8bc19304ef9e90738_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3236
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:4332

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    35KB

    MD5

    1ef6f71edb662c29f50c4809d4c133d7

    SHA1

    fe9be09f3fb120e56581da277ddbdc04dba3f6f9

    SHA256

    8e2be2421cb4a6d34059819e973f9cba5fcd15017f0ed7927cb39b9180619325

    SHA512

    033bc4f2a5a1ed6632c03fb27b751799642c90022ee93ff5e981b56b786414dca65882e1c04c8797b5454116f58da387d01375e01da9423660310dc209c1ecc8

  • memory/3236-0-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/3236-1-0x00000000005B0000-0x00000000005B6000-memory.dmp

    Filesize

    24KB

  • memory/3236-2-0x00000000005B0000-0x00000000005B6000-memory.dmp

    Filesize

    24KB

  • memory/3236-3-0x0000000002070000-0x0000000002076000-memory.dmp

    Filesize

    24KB

  • memory/3236-19-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/4332-20-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/4332-18-0x00000000006C0000-0x00000000006C6000-memory.dmp

    Filesize

    24KB