Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/04/2024, 11:42

General

  • Target

    2024-04-15_6409de6ec0952f0445d63163e70d08b3_cryptolocker.exe

  • Size

    50KB

  • MD5

    6409de6ec0952f0445d63163e70d08b3

  • SHA1

    424ef9eae4bb8d9a221d13d5c29f9bb1c3965ed7

  • SHA256

    8e769e8c8fdd8ee323d41223fb1b0a01a7b81d608931fbaa44f93713cac61745

  • SHA512

    372348a976a93e706d2999d9dfea70cc88617c73daf9bdc21ce229d3f741a873375714807145a7ff3637a6f80571190e2044279e6a8b5b5445fde7b3a071e6c5

  • SSDEEP

    768:79inqyNR/QtOOtEvwDpjBK/rJ+Nw8qnTHGfg:79mqyNhQMOtEvwDpjBxe8GGfg

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 3 IoCs
  • Detection of Cryptolocker Samples 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-15_6409de6ec0952f0445d63163e70d08b3_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-15_6409de6ec0952f0445d63163e70d08b3_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    50KB

    MD5

    ecd5b762d9b9ae541f0e126915372251

    SHA1

    8c0dcac656e50987521d346e80f0d51d7c83bd9d

    SHA256

    dede36263a67355081d6abe90a7947385bd81dbbb69904fcb6acf1a3c7b42582

    SHA512

    aabad6b4afca9fb0baf5d2b0a9c0a39c37a72b36721ee2d69fd6d512b9ed3719fe982ee26ecf19b29d1b095f1c9b86810bc14c1323c457c75faddbde829efb65

  • memory/2380-0-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2380-1-0x0000000002190000-0x0000000002196000-memory.dmp

    Filesize

    24KB

  • memory/2380-2-0x0000000002190000-0x0000000002196000-memory.dmp

    Filesize

    24KB

  • memory/2380-3-0x00000000021B0000-0x00000000021B6000-memory.dmp

    Filesize

    24KB

  • memory/2380-17-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/3220-19-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB

  • memory/3220-25-0x00000000004C0000-0x00000000004C6000-memory.dmp

    Filesize

    24KB