Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/05/2024, 00:25

General

  • Target

    2024-05-05_09d6bf1e80a4c8e1ef2ab0fd1d45c6a2_cryptolocker.exe

  • Size

    62KB

  • MD5

    09d6bf1e80a4c8e1ef2ab0fd1d45c6a2

  • SHA1

    0cd6f074b15186323913e1e33e9dcbe367baabae

  • SHA256

    1ddae030c8af4f3867cbbd47c5f82c7a4a025c9824ac3b237982fbf50c9a2a20

  • SHA512

    da5863ca98108ab79133c9066cb081f9c8528da3a877cecfa64f18d70778473c220d8290ef2dfbfef1e0647020ae8d83b46ba16ac045baa608b65a0170c46291

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjyaLccVCbt5A/z:V6a+pOtEvwDpjvx

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-05_09d6bf1e80a4c8e1ef2ab0fd1d45c6a2_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-05_09d6bf1e80a4c8e1ef2ab0fd1d45c6a2_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2620
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:428

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    62KB

    MD5

    9a6747eba259d368cac4cb7f1fcc4aa4

    SHA1

    09e0038b01985991acce60e990644f19a769d4af

    SHA256

    d6e024add30fc2a432c87de0995c6e22bb4f1699090ccc78f5c359036c260f9b

    SHA512

    51a46b8a4e433bb92987086119b13ff318543ae18dba6790f731a5aa03930112d13ad69e651f4c6bd9ee8fae490733739657d38857635d2654404afa403cfa0d

  • memory/428-17-0x0000000002060000-0x0000000002066000-memory.dmp

    Filesize

    24KB

  • memory/428-23-0x00000000021E0000-0x00000000021E6000-memory.dmp

    Filesize

    24KB

  • memory/2620-0-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/2620-1-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/2620-8-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB