Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2024, 05:36

General

  • Target

    2024-03-06_26d1e8cd1cd75b4fce9e92a49c2c1e1b_cryptolocker.exe

  • Size

    49KB

  • MD5

    26d1e8cd1cd75b4fce9e92a49c2c1e1b

  • SHA1

    fcc74f3dc92d7852044410b9f69cdb2fd949472b

  • SHA256

    680e342ebaeeda359aa09b99ae97330a0a44ae4cc82a14bc54ea7bb57ccd19d0

  • SHA512

    e99c9cbe620c6937b89cddb5ce585da698d9ec3f5e96a0952c0a5f557ac8158e729943ce41c7fa1ee314334fda30072e4ad28f0f6c954cceb5ab0acf1b505c7d

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaaEqbIu55id3AMWZD:X6QFElP6n+gJQMOtEvwDpjB0GIWiWLN

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-06_26d1e8cd1cd75b4fce9e92a49c2c1e1b_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-06_26d1e8cd1cd75b4fce9e92a49c2c1e1b_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2800
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3320

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    49KB

    MD5

    9982db71f60a051f91fa1fc4c2ff21a4

    SHA1

    52a1556f6d492c4d49f0efe67e151a1eecdd3650

    SHA256

    98740b4e588deabceb163c0f5b64f4f34324aa5c9080aff2914088bc370fe987

    SHA512

    674ed0772393600905f20ccffce48f3512f4a1e2b9ea61e4e9902313854ae76a2c7233d08ce2ce93f0211f0a3b6e05239f5845d563720c9b0f7e84603522486f

  • memory/2800-0-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/2800-1-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/2800-2-0x00000000006C0000-0x00000000006C6000-memory.dmp

    Filesize

    24KB

  • memory/3320-17-0x0000000002000000-0x0000000002006000-memory.dmp

    Filesize

    24KB

  • memory/3320-19-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB