Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/04/2024, 08:45

General

  • Target

    2024-04-17_d4e3f00ececfba64b7dfd8b3c2c9ceff_cryptolocker.exe

  • Size

    95KB

  • MD5

    d4e3f00ececfba64b7dfd8b3c2c9ceff

  • SHA1

    cd0f93710379f79ce1ad8cbe27d0d651ee4558b1

  • SHA256

    098988fb4df8a47d7923548fa3711b236fd9f3fbfe63aaeac8fab59a9d55fe47

  • SHA512

    fc7bf9344650ea87e100a0aeae0b83d5ddc5b2c252551b8f6e22c659717602466f7460da810a2f52e7053e2e83c82c6714e04800b6bac9e76cf494f8b4eb3f90

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/bD8:zCsanOtEvwDpjB8

Score
9/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • UPX dump on OEP (original entry point) 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-17_d4e3f00ececfba64b7dfd8b3c2c9ceff_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-17_d4e3f00ececfba64b7dfd8b3c2c9ceff_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3264
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2152

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    96KB

    MD5

    ede79d2dc5c2624fe7fcfb480fc5be5a

    SHA1

    7bf32c763eca1fdded8abefe3c1532e557c3eec7

    SHA256

    e955065d8b2b10b6d7d4b753d6e4d2f868c78aa1abfeb886be2a8676ffd0971c

    SHA512

    9f6000fd7ef2bfa27df942a1079f1da8d868cdb470e8ef6eac3bb070f4ec5af720179e2352f10fd958beb28eada6f921883e0f88a12b773b2565a957334c66a1

  • memory/2152-19-0x0000000000650000-0x0000000000656000-memory.dmp

    Filesize

    24KB

  • memory/2152-25-0x0000000000620000-0x0000000000626000-memory.dmp

    Filesize

    24KB

  • memory/2152-26-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/3264-0-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/3264-1-0x00000000020D0000-0x00000000020D6000-memory.dmp

    Filesize

    24KB

  • memory/3264-2-0x00000000020D0000-0x00000000020D6000-memory.dmp

    Filesize

    24KB

  • memory/3264-3-0x00000000020F0000-0x00000000020F6000-memory.dmp

    Filesize

    24KB

  • memory/3264-17-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB