Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/04/2024, 08:27

General

  • Target

    2024-04-17_41941e02fc77e43456eaf72748d861e1_cryptolocker.exe

  • Size

    75KB

  • MD5

    41941e02fc77e43456eaf72748d861e1

  • SHA1

    7e452001445ce90b74e8e8843490920e42f46606

  • SHA256

    6a80ba5ca3b2e935c1cd658cbee453e243bee49bf37f5ac55b2ced96c39e1267

  • SHA512

    124748560093f1461cbbd72b148d48d327ead031224e73b445cfe9c8551e0ec347d1c5cefe0f399f993d04cfa1f83c40d11f610bc8e8fc263d05d4561bb7bf26

  • SSDEEP

    1536:ZzFbxmLPWQMOtEvwDpj386Sj/WprgJN6tZdOyJ3Ku3o:ZVxkGOtEvwDpjcas

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-17_41941e02fc77e43456eaf72748d861e1_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-17_41941e02fc77e43456eaf72748d861e1_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:644
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2892

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    75KB

    MD5

    cf697a499984585707618ecd8942f469

    SHA1

    dc035cc5ac7529ed1842dc5e99c4251184f52195

    SHA256

    181ffc3605e3e3248705abc8bdb0b04f9dc804e4105d2bba859a2b506d8ca34c

    SHA512

    9deb7fdfbf48aaff1c48c107dd073755a5bd718e57edb3032c035c2dbc0cc8e8091adf3a18b2011ec26c7127c8e82e9d2bafb6ea800160a0136c0e2e7434035e

  • memory/644-0-0x00000000004F0000-0x00000000004F3000-memory.dmp

    Filesize

    12KB

  • memory/644-1-0x00000000005C0000-0x00000000005C6000-memory.dmp

    Filesize

    24KB

  • memory/644-2-0x00000000005C0000-0x00000000005C6000-memory.dmp

    Filesize

    24KB

  • memory/644-3-0x0000000002100000-0x0000000002106000-memory.dmp

    Filesize

    24KB

  • memory/644-18-0x00000000004F0000-0x00000000004F3000-memory.dmp

    Filesize

    12KB

  • memory/2892-20-0x00000000005D0000-0x00000000005D6000-memory.dmp

    Filesize

    24KB

  • memory/2892-19-0x00000000004F0000-0x00000000004F3000-memory.dmp

    Filesize

    12KB

  • memory/2892-21-0x00000000005B0000-0x00000000005B6000-memory.dmp

    Filesize

    24KB