Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/04/2024, 02:42

General

  • Target

    2024-04-10_66a1681880b53e40fa2a9ddbd1f12ed3_cryptolocker.exe

  • Size

    129KB

  • MD5

    66a1681880b53e40fa2a9ddbd1f12ed3

  • SHA1

    fc8ef04847649aa31ada9dc3fdc1f62b6abb6530

  • SHA256

    8774b37fc88708def4b46d3c76270b0ccb7b1b24361608bd67755664196f2e90

  • SHA512

    d487510b073ec30c1212a5fbc5a36accc001beb8ceb292c1414c7013f5241c2890b600ef9a2299fd639a09be3fc6b38b051f96bae0dcfdf7987573505db93463

  • SSDEEP

    1536:u6QFElP6n+gWMOtEvwDpjJGYQbN/PKwNgpwb2CH:u6a++OtEvwDpj6zD

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-10_66a1681880b53e40fa2a9ddbd1f12ed3_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-10_66a1681880b53e40fa2a9ddbd1f12ed3_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3252
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:4668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    129KB

    MD5

    2c43a9e304a0db8c7777547857498327

    SHA1

    598cdf99b0dc9d894724e7b33c762a38249abba0

    SHA256

    31c44fe3cc8e1773eecba57e6ab1fb17aea86d533aac43cb65be750c901061a6

    SHA512

    701d763f34ccde8776deb912651d62ef73216dc4fb870b0b74810d222e3e6acfae54c8364e541cd115ebfbfc72f40fffdf1c41dce2772d3ce027f5e3faa038e1

  • memory/3252-0-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/3252-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/3252-2-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/4668-17-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB

  • memory/4668-23-0x00000000004C0000-0x00000000004C6000-memory.dmp

    Filesize

    24KB