Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/02/2024, 04:52

General

  • Target

    2024-02-24_763b4b23e0bd9cb639e22328965ab90f_cryptolocker.exe

  • Size

    50KB

  • MD5

    763b4b23e0bd9cb639e22328965ab90f

  • SHA1

    34ac92cf5b3217d022a79ee9e60fcd9acd3d2c7b

  • SHA256

    7895cdd946d3c8ea939f59826209fc7ef9c9744ef5fca18080426c45496f5d49

  • SHA512

    06b448108cd897b1ea2d32dfc6ec468c4c9c76b49e24d16e2a3b74b52030c0b974fc1ac34dd7531d4f5bd44894443c30b73e122231a8a72d7df4782c7fd929c3

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb6Impy8:BbdDmjr+OtEvwDpjM/

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 3 IoCs
  • UPX dump on OEP (original entry point) 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-24_763b4b23e0bd9cb639e22328965ab90f_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-24_763b4b23e0bd9cb639e22328965ab90f_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3180
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    50KB

    MD5

    8e743cabe024d1ea44dd0ed6095b1893

    SHA1

    7ceb3eb93dc663d2a7ecfe10efad4e1dca5e096e

    SHA256

    94818d27b1c2a6ca91da4e0785a538420e9251f213a5c37a173254406c2e9ac0

    SHA512

    1301d3fccba18a9a413078243c3009298bae9d1c2740d98deb87a268ea64703f657246f3ab95058148bb29221cf3007086b5bd6c969fa5a6d28d834529ca8237

  • memory/3180-0-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/3180-1-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/3180-2-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/3180-3-0x00000000005C0000-0x00000000005C6000-memory.dmp

    Filesize

    24KB

  • memory/3180-16-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/3716-18-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/3716-20-0x0000000001FF0000-0x0000000001FF6000-memory.dmp

    Filesize

    24KB

  • memory/3716-22-0x0000000001FD0000-0x0000000001FD6000-memory.dmp

    Filesize

    24KB

  • memory/3716-27-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB