Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/05/2024, 22:30

General

  • Target

    2024-05-16_ed4be8e3296baf5aaac53b5aab448926_cryptolocker.exe

  • Size

    39KB

  • MD5

    ed4be8e3296baf5aaac53b5aab448926

  • SHA1

    880fc05736e96f6bee84be064efb631f2aa94eb9

  • SHA256

    36499009f2c9940f7d63aa67d2968ac45045b9b0b3a50372e99f181d8a8d75a1

  • SHA512

    ec027bdb5dc114db327fc355e0c1205b8da9792fef0a04f3e2924b907445bb0191625c5f842a9ec2da19fd8520daba14445cdca79652fcd69d618be46fe7fd43

  • SSDEEP

    384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSzn1KkZCb9q8IujdxNYLbL5m:b/yC4GyNM01GuQMNXw2PSj1Pqq8BYtm

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-16_ed4be8e3296baf5aaac53b5aab448926_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-16_ed4be8e3296baf5aaac53b5aab448926_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4404
    • C:\Users\Admin\AppData\Local\Temp\retln.exe
      "C:\Users\Admin\AppData\Local\Temp\retln.exe"
      2⤵
      • Executes dropped EXE
      PID:1012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\retln.exe

    Filesize

    39KB

    MD5

    d39d349091e6bb61f4464e58ff2f1956

    SHA1

    7616803c016b5f998dc2ce07ec4c1eaa78dadc14

    SHA256

    84ab500b1af26421732b6efb82f6d34f8b8fa35eda9e71cfc00ce9fc69a0f183

    SHA512

    00dfb752d7bb22575e57bc77873a0df55ddd16f9e4e38745b3ca1d7acfb72bbd21156d1cfeaf52f53c9e4d44539981eff03f46a7464269b553db7e86accd22e7

  • memory/1012-25-0x0000000002160000-0x0000000002166000-memory.dmp

    Filesize

    24KB

  • memory/4404-0-0x0000000002120000-0x0000000002126000-memory.dmp

    Filesize

    24KB

  • memory/4404-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/4404-8-0x0000000002120000-0x0000000002126000-memory.dmp

    Filesize

    24KB