Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/04/2024, 03:54

General

  • Target

    2024-04-11_d9ccf735a696896f0dc66ab57a607344_cryptolocker.exe

  • Size

    45KB

  • MD5

    d9ccf735a696896f0dc66ab57a607344

  • SHA1

    9c7dc51bc4dac88772c019f2ea228b6403cc5e46

  • SHA256

    ac987cd1afffbd4f6571db3acdf3ab59f1210435b6e097d0b8750d96115b172e

  • SHA512

    75826679909a30a5b6d3e775e3ebcf573eac4dc791672f8eeb5fc6d964b77e76b7697bdf82d450abc5bf558e37419c49f1532418487a951d97cd5173d1c845e9

  • SSDEEP

    768:P6LsoVEeegiZPvEhHSP+gp/QtOOtEvwDpjBBMLZdzuqpXsiE8Wq/DpkK:P6Q0ElP6G+gJQMOtEvwDpjB8WMlN

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-11_d9ccf735a696896f0dc66ab57a607344_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d9ccf735a696896f0dc66ab57a607344_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3008
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    45KB

    MD5

    41b37d43602ccc62249569aaabb6bcab

    SHA1

    fc1aebc93e52a64539158fe5c62de5cb6433eaf5

    SHA256

    32cb512d928dce7c21a90d16de1190cbe12646c73734e4654fc824e8c90ff17a

    SHA512

    d74965773dae8ca5f6d1270802a2d5657c924d0ae3e51fca7702f9f636f96567d8f677dd6f74e08e3b20a1c927b65ebb0fb8533739d5efd78ab2489af328dc82

  • memory/632-17-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/632-20-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB

  • memory/632-22-0x00000000004C0000-0x00000000004C6000-memory.dmp

    Filesize

    24KB

  • memory/632-27-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/3008-0-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/3008-1-0x00000000005E0000-0x00000000005E6000-memory.dmp

    Filesize

    24KB

  • memory/3008-2-0x00000000005E0000-0x00000000005E6000-memory.dmp

    Filesize

    24KB

  • memory/3008-3-0x0000000000600000-0x0000000000606000-memory.dmp

    Filesize

    24KB

  • memory/3008-18-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB