Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/03/2024, 17:26

General

  • Target

    2024-03-26_36373d568bd8470592e1e8e916f582f9_cryptolocker.exe

  • Size

    80KB

  • MD5

    36373d568bd8470592e1e8e916f582f9

  • SHA1

    0591702b2648a6d40b30433802f83ce099adc36f

  • SHA256

    df44309d16ae8834b856dbc950bbadfd04ddc671e5df1cf9c03f1e2f86339400

  • SHA512

    c34fa3f20c3d87d7ff24400492d054bedaeac72570e0fe25bbcaa9bb40c7bce45dc68b348d08cd8949a4c69f1fba3c936e272f9a54a092f00ae02d8521780cb9

  • SSDEEP

    1536:Tj+jsMQMOtEvwDpj5HmpJpOUHECgNMo0vp2EMMrX:TCjsIOtEvwDpj5HE/OUHnSM9

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-26_36373d568bd8470592e1e8e916f582f9_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-26_36373d568bd8470592e1e8e916f582f9_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:5024
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    81KB

    MD5

    f4aabe6a4f69695f3fa5823f9626592e

    SHA1

    3ec2ce58ada22fbdefd910aa4ce7486a994bbb0e

    SHA256

    03125e40a843de01c20ad4d39960d9d5c7dd8c9d178cabede2abc5da092e00f2

    SHA512

    827ab569fc58862117fcdec4fb8f347a53b1426062a89e8e9e0e921ebcbe2715c4a4b67655dd35e9422ed6d3395cb9feca18ade9ea8c4b9d5ede8a649a03d4b4

  • memory/2172-18-0x0000000000500000-0x000000000050E000-memory.dmp

    Filesize

    56KB

  • memory/2172-20-0x0000000002080000-0x0000000002086000-memory.dmp

    Filesize

    24KB

  • memory/2172-26-0x00000000021E0000-0x00000000021E6000-memory.dmp

    Filesize

    24KB

  • memory/2172-27-0x0000000000500000-0x000000000050E000-memory.dmp

    Filesize

    56KB

  • memory/5024-0-0x0000000000500000-0x000000000050E000-memory.dmp

    Filesize

    56KB

  • memory/5024-1-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/5024-2-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/5024-3-0x00000000005C0000-0x00000000005C6000-memory.dmp

    Filesize

    24KB

  • memory/5024-17-0x0000000000500000-0x000000000050E000-memory.dmp

    Filesize

    56KB