Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/03/2024, 21:24

General

  • Target

    2024-03-15_0325c188152f7d2087bed40a0b87ad81_cryptolocker.exe

  • Size

    48KB

  • MD5

    0325c188152f7d2087bed40a0b87ad81

  • SHA1

    8c2f6194de430c54053ddec206c0301281abe348

  • SHA256

    048bc20e087e8d7496f5aa624be16c18b7d18a97cb886bc6a536dc2b2c1227fc

  • SHA512

    5a21df44ea62ad352623242aafb87e65a9e6dca8bb10e2553aec2f45b27ff33c31f61dbbd439d3cc5b67a48c35cf1347b13ad27f70b044fccaea5622bd17ec5c

  • SSDEEP

    768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4/Uth8igNrr46xdUUuuMT8x:vj+jsMQMOtEvwDpj5Hczer5ixuMU

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-15_0325c188152f7d2087bed40a0b87ad81_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-15_0325c188152f7d2087bed40a0b87ad81_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4152
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:1448

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    48KB

    MD5

    601043175ba8eaf09e18d37bb6895956

    SHA1

    13ab7dfa1a53e0423ee0aec53c5b78bbe8ec98d6

    SHA256

    7da169a121a446cb1e366f425df7702ff153f3e2111e465571cf632e21903213

    SHA512

    e7f04549e192a4c80f1794f2cd1ebbc9a8b10b07143786d01aea9027cc4d35774946e629765aeba697899bca0fd616b794a895a5f28e34cbe15f137ea3a10ae7

  • memory/1448-17-0x00000000006C0000-0x00000000006C6000-memory.dmp

    Filesize

    24KB

  • memory/1448-22-0x0000000000560000-0x0000000000566000-memory.dmp

    Filesize

    24KB

  • memory/4152-0-0x0000000002300000-0x0000000002306000-memory.dmp

    Filesize

    24KB

  • memory/4152-1-0x0000000002300000-0x0000000002306000-memory.dmp

    Filesize

    24KB

  • memory/4152-2-0x0000000002220000-0x0000000002226000-memory.dmp

    Filesize

    24KB