Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/04/2024, 17:30

General

  • Target

    2024-04-22_20422797274e6488ec03aeb266029cb2_cryptolocker.exe

  • Size

    51KB

  • MD5

    20422797274e6488ec03aeb266029cb2

  • SHA1

    0f94e1e3a68d1f583f624c21eb250d89407f1093

  • SHA256

    fa3ec97c0f8cb40a1e2f96527482df1a1206a8927d7fed20922968648bbe9c03

  • SHA512

    070a632f33c03c81684e6a7df140d64d2b5d0549c57e19fda30ed5c4b3d553574399cabe6a562785b4f6cc83e00f891db3142bbb978bbaf18b36f39e77aa2df3

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/BtOOtEvwDpjBVaD3E09vaTCFWpzgVoI:X6QFElP6n+gJBMOtEvwDpjBtELVd

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-22_20422797274e6488ec03aeb266029cb2_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-22_20422797274e6488ec03aeb266029cb2_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1372
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:680
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1028 --field-trial-handle=2328,i,5873823382323802923,13134441441264702821,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4016

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\asih.exe

      Filesize

      52KB

      MD5

      e7389f369e756375a4fb53e85e2952f8

      SHA1

      6a3b1e9270f24b58c91fab06b42ff49918b5ee05

      SHA256

      79ba76629f6633c0a0d97869423175f6f27045585fd0912ca73517198b777e71

      SHA512

      9c97214e9cd97f7466a48509a8716ba5564a82d2cf71cf815dc62cbc476b9337a8e73264909efc21479a8229460ec91f44b922e0a7125622d07f449f948a6686

    • memory/680-18-0x0000000002060000-0x0000000002066000-memory.dmp

      Filesize

      24KB

    • memory/680-17-0x00000000021E0000-0x00000000021E6000-memory.dmp

      Filesize

      24KB

    • memory/1372-0-0x00000000005E0000-0x00000000005E6000-memory.dmp

      Filesize

      24KB

    • memory/1372-1-0x00000000005E0000-0x00000000005E6000-memory.dmp

      Filesize

      24KB

    • memory/1372-2-0x0000000000600000-0x0000000000606000-memory.dmp

      Filesize

      24KB