Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/04/2024, 05:40

General

  • Target

    2024-04-18_8c08d733a231c2dddef20925204accbe_cryptolocker.exe

  • Size

    62KB

  • MD5

    8c08d733a231c2dddef20925204accbe

  • SHA1

    ca39df62bb713e9400e807cd8a6f5e3c706fb149

  • SHA256

    1fe5b98c5573e3ae91b607360795a6829b2b9dcc0110e925ee44f71c713a6d71

  • SHA512

    d05c48c1c5f3c11329a1c6f839a8cc8b6b1d30f39d54bd40cfdd3e9cb6e1754a68b432d56d361e96732c708db0a126d893710c7d5362cd5900b1af07bee9a164

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsit:BbdDmjr+OtEvwDpjM80

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-18_8c08d733a231c2dddef20925204accbe_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-18_8c08d733a231c2dddef20925204accbe_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2448
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1152

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    62KB

    MD5

    e5714fa7cc6b038cab8d5cfa2196d630

    SHA1

    25c7d6b3458651991c498ecf7e81559c683bd96b

    SHA256

    2794de4b4393d88340ce900fe5c466e2c291a6551f6b6097425bae17fe28b97c

    SHA512

    ac34483c69a596cb01045ee28dad6deaecc3bd776ee5ff2dca64a9392f8541c194f4202eda23f58049c357ccf7e824a129ecc58d68c1975d91606e283fd9edad

  • memory/1152-19-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/1152-25-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/1152-26-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2448-0-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2448-1-0x00000000021C0000-0x00000000021C6000-memory.dmp

    Filesize

    24KB

  • memory/2448-2-0x00000000021C0000-0x00000000021C6000-memory.dmp

    Filesize

    24KB

  • memory/2448-3-0x0000000002040000-0x0000000002046000-memory.dmp

    Filesize

    24KB

  • memory/2448-17-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB