Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/03/2024, 06:45

General

  • Target

    2024-03-16_cfd53fb030e1cd621d2536b896623128_cryptolocker.exe

  • Size

    84KB

  • MD5

    cfd53fb030e1cd621d2536b896623128

  • SHA1

    5834421d63f4699ba807a708a25bffaedd10bc27

  • SHA256

    393b5f45419f795de89c44941234b26dd1db575169f17fd98961020d2e0f64b6

  • SHA512

    7b974cfbc0a331b575f8e06f99404166f3bfc83f85df4989ab6f913cce091089bd46fc0ae9bd6df90c8cb0c5f55b4516bff05e80bada64e8e7e906336a07a36d

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjyaLccVNlVSLQsM:V6a+pOtEvwDpjvp1

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-16_cfd53fb030e1cd621d2536b896623128_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-16_cfd53fb030e1cd621d2536b896623128_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4500
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    85KB

    MD5

    7b3f282e2eedab9e64e034bf4043bf78

    SHA1

    c8cd7d6a2a91335dc037f62dccc0bd015b22ef95

    SHA256

    49a1a154a8df8b84bf311107eeccb3a5c96e16bc12d2521f9967da8a19ba3e41

    SHA512

    7da1b2606fe55958972af2f37a7da832d2f5e2a769690f354f0c84d628e80267111b3cee686553694129b6fe40f41cab537d1c227d99eefdf10499930faf1f43

  • memory/1972-17-0x00000000006C0000-0x00000000006C6000-memory.dmp

    Filesize

    24KB

  • memory/1972-19-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/4500-0-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/4500-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/4500-2-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB