Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/04/2024, 16:35

General

  • Target

    2024-04-04_386a2027a29d95e24b2f2fb59a6a7b00_cryptolocker.exe

  • Size

    68KB

  • MD5

    386a2027a29d95e24b2f2fb59a6a7b00

  • SHA1

    0f496e0b55f5c99c7f5391d2f1eb28e511697be1

  • SHA256

    705551e42e64dc7d83b4dddfdff8eca793c5e6971939fe0ec67b82afb1abf0c6

  • SHA512

    58077fffe15946f11c32bdc18410dbd887a2cba0c56a679d0f1b327c288d6442fc6ce5fc58a2d3309badf8208be61226bd3277a0e5a117b273857dd5e7d738b8

  • SSDEEP

    1536:Dk/xY0sllyGQMOtEvwDpjwycDtKkQZQRKb61vSbgZ3QzNKUE:DW60sllyWOtEvwDpjwF85m

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-04_386a2027a29d95e24b2f2fb59a6a7b00_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-04_386a2027a29d95e24b2f2fb59a6a7b00_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1416
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1456

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    68KB

    MD5

    18a95dca420cfe938330fc6abd805c9a

    SHA1

    def39421b9a9f513c65bf909b74abae9a411dd18

    SHA256

    8a4b2f012521abf5ddac60f81f3a10409dae72e63b6d506eb886a3f4c5bc6397

    SHA512

    3a0ef5d5e7c0297ea21b4eb46bec64844eb43b2dc9d636f23677850aeb87d6c3204320da28c231646df2d3814227bcd2787cdfa3dc119ba9ddd8bc95a84acc3b

  • memory/1416-0-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/1416-1-0x00000000007F0000-0x00000000007F6000-memory.dmp

    Filesize

    24KB

  • memory/1416-2-0x00000000007F0000-0x00000000007F6000-memory.dmp

    Filesize

    24KB

  • memory/1416-3-0x0000000000810000-0x0000000000816000-memory.dmp

    Filesize

    24KB

  • memory/1416-18-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/1456-17-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/1456-20-0x00000000005E0000-0x00000000005E6000-memory.dmp

    Filesize

    24KB

  • memory/1456-22-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB