Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/02/2024, 15:37

General

  • Target

    2024-02-21_8f611247787fb57b7988bbbb05a90470_cryptolocker.exe

  • Size

    51KB

  • MD5

    8f611247787fb57b7988bbbb05a90470

  • SHA1

    60dcd3185ddbe4b346798382d5e9dd688c3390f4

  • SHA256

    040e3b62b86ff651b3be01e659e5a75850daf16f6628336b40449a44289d0d2d

  • SHA512

    a750bc6d2b400e21dd0234cd461ac036a67ada108f8fa237608d31d6ffc414eab00c30c3fcc1066c906f8f5fad09f3ef1ffb5f4346c64442d89cad78b6d40eee

  • SSDEEP

    768:79inqyNR/QtOOtEvwDpjBK/rJ+Nw8qn8pKIRk:79mqyNhQMOtEvwDpjBxe8TpXRk

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-21_8f611247787fb57b7988bbbb05a90470_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-21_8f611247787fb57b7988bbbb05a90470_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:764
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1328

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    51KB

    MD5

    2198fffc95da56f4314320cbd6da934b

    SHA1

    f66dd57f10db5fc5f168c203ca4f9a64cd994e57

    SHA256

    7fa1609a731a2876c916ca55681b4a98b434677c087bd4632b9f992afa7e9317

    SHA512

    bb43bb502a6f72fdd2fa8af498ab9d017c19502c37964d63f1517fb3771af563c83a1bb384479bec57a71b9b886a32c4529e519538ac15a289be99f25992661e

  • memory/764-0-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/764-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/764-2-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/764-3-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/764-18-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/1328-17-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/1328-20-0x0000000000770000-0x0000000000776000-memory.dmp

    Filesize

    24KB

  • memory/1328-26-0x0000000000660000-0x0000000000666000-memory.dmp

    Filesize

    24KB