Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/02/2024, 05:29

General

  • Target

    2024-02-29_a302b78a27dcd5847cdf9fade08ba524_cryptolocker.exe

  • Size

    83KB

  • MD5

    a302b78a27dcd5847cdf9fade08ba524

  • SHA1

    a71ced9b16fa4318627c1c71dc56095680b7ed8d

  • SHA256

    2164c4fcdf3cb87c5351841f1a6e9431bd306957eed5df7d97883591983db74e

  • SHA512

    3b3efff707d5121a5c34bff6625c95bfe2b44ed260d1f4236b141aef3b0c92ed72b08aa1a5f00b8fc32abf4e04ad16c79af1556acdc01d165fb89d46412799c4

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS18:zCsanOtEvwDpjC

Score
9/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 5 IoCs
  • UPX dump on OEP (original entry point) 5 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-29_a302b78a27dcd5847cdf9fade08ba524_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-29_a302b78a27dcd5847cdf9fade08ba524_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4308
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:2732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    83KB

    MD5

    cb10c43307752162045f2a3d3a78c9eb

    SHA1

    5ec02edaf5703d16486702997baaaa6116c08cc7

    SHA256

    05a7fcde17197f9c8bd83e6f7279f315ac860244143f92088ee8fdf42a4aa04f

    SHA512

    94e93958f5e485a958d50cd20b6bc377e3a0fb94366691059d943245421fb42878593117281c7990ed30c310346619eeeee6c7c185314929b09b9e748451599b

  • memory/2732-18-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2732-20-0x0000000000850000-0x0000000000856000-memory.dmp

    Filesize

    24KB

  • memory/2732-22-0x0000000000690000-0x0000000000696000-memory.dmp

    Filesize

    24KB

  • memory/2732-55-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/4308-0-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/4308-1-0x00000000007A0000-0x00000000007A6000-memory.dmp

    Filesize

    24KB

  • memory/4308-2-0x00000000007A0000-0x00000000007A6000-memory.dmp

    Filesize

    24KB

  • memory/4308-3-0x00000000007C0000-0x00000000007C6000-memory.dmp

    Filesize

    24KB

  • memory/4308-17-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB