Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/03/2024, 08:37

General

  • Target

    2024-03-14_61f3d6546ea0fb154ab5cc9da945c7ed_cryptolocker.exe

  • Size

    41KB

  • MD5

    61f3d6546ea0fb154ab5cc9da945c7ed

  • SHA1

    376460e977a712b675573b4006bc0fdcb15740cb

  • SHA256

    7ee88337c85d2332da3fe1b1aaab8f2593cfb3d08afddef49a4e483895f38618

  • SHA512

    86cae49ab161a26df6cd636f16a5af6e0721401967a788979015f90fcdca7fcf1817666c343c7bf4021efc6c911b522720d9359e10cad158ec7c5d85218da543

  • SSDEEP

    768:b/yC4GyNM01GuQMNXw2PSjHPbSuYlW8PA9Do:b/pYayGig5HjS3NPA9Do

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-14_61f3d6546ea0fb154ab5cc9da945c7ed_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-14_61f3d6546ea0fb154ab5cc9da945c7ed_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:5012
    • C:\Users\Admin\AppData\Local\Temp\retln.exe
      "C:\Users\Admin\AppData\Local\Temp\retln.exe"
      2⤵
      • Executes dropped EXE
      PID:1920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\retln.exe

    Filesize

    42KB

    MD5

    3ae515e8074afdc7aeb75474cf36acda

    SHA1

    3f1e36d366e1b7e9502ed725539183ec247e909b

    SHA256

    c452d996d90b3bcc1ae00a647a4486dcf471c6fca8d20ab023df0ec91708fb06

    SHA512

    08777b2694618efb769298c219cd0deb2c0a1218b3c8843cd66fa98a35c34fe205c180e3c55746ee40e9c21af4dce63e1d2f3ce0a7758a1fd0c32cf62424f0e1

  • memory/1920-20-0x0000000002010000-0x0000000002016000-memory.dmp

    Filesize

    24KB

  • memory/5012-0-0x0000000002200000-0x0000000002206000-memory.dmp

    Filesize

    24KB

  • memory/5012-1-0x0000000002200000-0x0000000002206000-memory.dmp

    Filesize

    24KB

  • memory/5012-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB