Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/04/2024, 04:26

General

  • Target

    2024-04-30_0d30335f8dc869f5308abf7915a2a224_cryptolocker.exe

  • Size

    67KB

  • MD5

    0d30335f8dc869f5308abf7915a2a224

  • SHA1

    218366e48b5f9a5a484d753cac1447c041867f89

  • SHA256

    c92de2f91039c83fc5108bdec3894e21463d9313bab5a25506c5014dec369ebe

  • SHA512

    c21af0bc225ff852b5044619a073d888f4dc1a6da5a1c09cdf6c107072a04a908136bdeb54b7077d257eed590f3b4e443611cbaec91a6c67d83736f13a2b3e56

  • SSDEEP

    768:XS5nQJ24LR1bytOOtEvwDpjNbZ7uyA36S7MpxRXrZSUNsYD/X:i5nkFGMOtEvwDpjNbwQEI8UZDv

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • Detects executables built or packed with MPress PE compressor 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-30_0d30335f8dc869f5308abf7915a2a224_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-30_0d30335f8dc869f5308abf7915a2a224_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4756
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2124

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    67KB

    MD5

    17bd0cbd5dcff90ad70698e997b1e503

    SHA1

    8021605a4869e63c0fc8a61ce6b25105805dd757

    SHA256

    51b037699795729b94dbd936caba57f1faf646b60885552a5fd057e6d46b39db

    SHA512

    add020246219a934bbea65c2a2b222e5a6258939e8671a9d2715488467a84c7caab41ca0135f5ac881f4186c601b90a47f454ca79a9cb8514ea869047c725638

  • memory/2124-19-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2124-23-0x0000000002070000-0x0000000002076000-memory.dmp

    Filesize

    24KB

  • memory/2124-27-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/2124-28-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/4756-0-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/4756-1-0x0000000000660000-0x0000000000666000-memory.dmp

    Filesize

    24KB

  • memory/4756-2-0x0000000000820000-0x0000000000826000-memory.dmp

    Filesize

    24KB

  • memory/4756-9-0x0000000000660000-0x0000000000666000-memory.dmp

    Filesize

    24KB

  • memory/4756-18-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB