Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/02/2024, 05:24

General

  • Target

    2024-02-19_fcb1e2b12daeb61c39f3c805519af787_cryptolocker.exe

  • Size

    54KB

  • MD5

    fcb1e2b12daeb61c39f3c805519af787

  • SHA1

    4e2038c4adf90473938d8a9425c831b632ef10f7

  • SHA256

    1345499f6bf11bddb43c22bc763fe87182ed87270ef85b7d353c8c08756313b2

  • SHA512

    e8e7a2d972ce852d9336bd3c3cb17d0ae5b1dafe50913a0283289024a26cbabb4e526647ea24785d4d5e8bec0fe24fd5e7f37b1e6f28311100c1dea4d67b3189

  • SSDEEP

    1536:X6QFElP6n+gJBMOtEvwDpjBtE1yILJ0V1:X6a+BOtEvwDpjBOi

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-19_fcb1e2b12daeb61c39f3c805519af787_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-19_fcb1e2b12daeb61c39f3c805519af787_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3924
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:4180

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    55KB

    MD5

    66ea9d280b0956f5d02485549ccdb0da

    SHA1

    9696f2b2cd18ec858c87a38f117e9868f1af4883

    SHA256

    8cd44df9d345a9309ba0b37c3000e9bc4d5084a0de1f60907e40d16a50d8b5e7

    SHA512

    a48c1c0584ce82ea8505b9f5881da62bedb64078ded9a4d06d883d0d1ca130c4baacd249278a635e73ffaaa44fdacc716d81d2a9dae721719f415d9c8dfff257

  • memory/3924-0-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/3924-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/3924-2-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/4180-17-0x00000000005D0000-0x00000000005D6000-memory.dmp

    Filesize

    24KB

  • memory/4180-21-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB