Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/03/2024, 00:50

General

  • Target

    2024-03-09_fcc223fb39181c1c23162dd69a9b9958_cryptolocker.exe

  • Size

    38KB

  • MD5

    fcc223fb39181c1c23162dd69a9b9958

  • SHA1

    9ccd6011a1787c219c544210d32f87804ac8f466

  • SHA256

    65196b6a1c1e5fbf593ce116a52b65e577413dd2e3b0d0fa0423e92cb974f639

  • SHA512

    88007af1ed68d388d7ae4733df97116a5fda576d95ec8e73ef1d138dd9de05bdadb4b995a309fb96a5cec4b79b17c3ecf0bce24958175f3cae3445f6fa2d8064

  • SSDEEP

    768:bxNQIE0eBhkL2Fo1CCwgfjOg1tsJ6zeen7JEgx3OkY:bxNrC7kYo1Fxf3s06gY7

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-09_fcc223fb39181c1c23162dd69a9b9958_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-09_fcc223fb39181c1c23162dd69a9b9958_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3688
    • C:\Users\Admin\AppData\Local\Temp\pissa.exe
      "C:\Users\Admin\AppData\Local\Temp\pissa.exe"
      2⤵
      • Executes dropped EXE
      PID:3620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\pissa.exe

    Filesize

    38KB

    MD5

    32134a65c8805602c4d030cafca8e484

    SHA1

    e93662a0832aeca0c6b3f4823169a68f7fefbd62

    SHA256

    703720129137357103a3371df52e226fd90871cc832a43df67eaf0e44731de20

    SHA512

    1f6c080d71fe657a7cfacc599d85892fe34d178df24b02bc3e72fa79bb35117daa444f5f9ac676e8d6dd6262bfa58771f79a746d52400a4895ac8881a026c22f

  • memory/3620-17-0x0000000002240000-0x0000000002246000-memory.dmp

    Filesize

    24KB

  • memory/3620-19-0x0000000002210000-0x0000000002216000-memory.dmp

    Filesize

    24KB

  • memory/3688-0-0x0000000002D60000-0x0000000002D66000-memory.dmp

    Filesize

    24KB

  • memory/3688-1-0x0000000002D60000-0x0000000002D66000-memory.dmp

    Filesize

    24KB

  • memory/3688-2-0x0000000003010000-0x0000000003016000-memory.dmp

    Filesize

    24KB