Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/05/2024, 18:31

General

  • Target

    2024-05-10_dd2f4041e20ff87da830960a71fdcde2_cryptolocker.exe

  • Size

    41KB

  • MD5

    dd2f4041e20ff87da830960a71fdcde2

  • SHA1

    b24b6bdeb30b5ba4e64dd37784931e87c2df03e0

  • SHA256

    5b9bf18a205f802f6bd40f65588b695dc733cbd6d42d164d48d2f895e2e8f396

  • SHA512

    e4f7a881089a81cc53ca6fd239ab363bf55029186ee9846b88e52079f4a7fea106e76972dab0850ad0396749d94e1b02c4169036580fbd3310741cce84e29642

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaac4HK/wSvuQTCL:X6QFElP6n+gJQMOtEvwDpjBsYK/fw

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-10_dd2f4041e20ff87da830960a71fdcde2_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-10_dd2f4041e20ff87da830960a71fdcde2_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1012
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3216

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    41KB

    MD5

    ab4b3a929e9cd6813269bbc85da4da69

    SHA1

    fd0bfdc147a7c96b0e2d910e2b3f9a4a70f14ffa

    SHA256

    2808757ffe913b53822e31f58a262f4262c7845b83e3c8fb2c1d2a1c85307724

    SHA512

    4362b936700e8dda125baebbd810d2a7afda59252f992c5b88ad4d0f6d2bbcef3a4ddce331382cf20634f7dc83f33df998d05a1e81caf0d8169e70b3cc47fd47

  • memory/1012-0-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/1012-1-0x00000000005C0000-0x00000000005C6000-memory.dmp

    Filesize

    24KB

  • memory/1012-8-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/3216-23-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/3216-17-0x00000000006C0000-0x00000000006C6000-memory.dmp

    Filesize

    24KB