Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/02/2024, 14:29

General

  • Target

    2024-02-24_323acda3834385c7967485aaccd9c848_cryptolocker.exe

  • Size

    43KB

  • MD5

    323acda3834385c7967485aaccd9c848

  • SHA1

    be0bf6e703100344559dfe959e588423ec42631b

  • SHA256

    d453290e04e27bd9f44c0196e8d41a8e3d4d64b3b8c61db34ea143e9e057a1a6

  • SHA512

    390fd9905520b00abbed397b5044c51a95f6831bfc5d3c349c2d0c3854083eda0e2ff0cc7b1cc621a142a644edb8315eded97fed888c63a5cb89c5366634f63e

  • SSDEEP

    768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLam5aFr7YOzz2U:V6QFElP6n+gMQMOtEvwDpjyaYaFAHU

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-24_323acda3834385c7967485aaccd9c848_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-24_323acda3834385c7967485aaccd9c848_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:5112
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:4152

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    43KB

    MD5

    00dd88d74875a8c6777f3e7e58de3fad

    SHA1

    55f5cb03f37b3c1627e6f50403fb257e93dac59b

    SHA256

    448caf46edcc355a653621d676b7b6c82ecf3ba4f18e3898f73435b8578b39f5

    SHA512

    818aa0c7d6d5b8b9108176579ad04c3e891ce5cf245950f6b244c22bb47cc84cf1a939d76541121727ef4fe0cc92d05910f39fd1c22ab76ceeaa4c81cabf52ff

  • memory/4152-17-0x00000000005B0000-0x00000000005B6000-memory.dmp

    Filesize

    24KB

  • memory/4152-18-0x00000000020F0000-0x00000000020F6000-memory.dmp

    Filesize

    24KB

  • memory/5112-0-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB

  • memory/5112-1-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB

  • memory/5112-2-0x00000000005E0000-0x00000000005E6000-memory.dmp

    Filesize

    24KB