Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/05/2024, 04:36

General

  • Target

    2024-05-24_8b8e273bea40fed5a2a938d07b0d3469_cryptolocker.exe

  • Size

    52KB

  • MD5

    8b8e273bea40fed5a2a938d07b0d3469

  • SHA1

    d8840788dd559726d2fd2681f8c2fa776b04f387

  • SHA256

    0ced20722813e2754ca7741cf4d4c3d608be73882a57a77b65390d08dc512970

  • SHA512

    635efbc6df251516b16bf6109f9db46bd869f49dbdadb81a0979d1a6323ff7b534038ff641c848c5dd00fca8da5a212a1ae2d679a1b431334eb28f7595c50dbe

  • SSDEEP

    768:79inqyNR/QtOOtEvwDpjBK/rJ+Nw8qn8pKIRszDr6at:79mqyNhQMOtEvwDpjBxe8TpXRSDeat

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-24_8b8e273bea40fed5a2a938d07b0d3469_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-24_8b8e273bea40fed5a2a938d07b0d3469_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:932
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:388

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    52KB

    MD5

    ecf90eb2f06ad3cd352256d995b1e573

    SHA1

    3e31a6a464d6c0639e072e8e6f2dac6616debee1

    SHA256

    9b47049ada8c606da2f5585d6da5a12b5568730786e13aa10355bb6fa9205409

    SHA512

    7fd904cde608e091bf12a519866967bc4a5caef65331d27040401f53a1add06b24e03e584cc38f4f0f42db3e5eaede60bdf13a7db9c24484a0ca68cabeac7ac6

  • memory/388-18-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/388-20-0x0000000002100000-0x0000000002106000-memory.dmp

    Filesize

    24KB

  • memory/388-26-0x00000000020E0000-0x00000000020E6000-memory.dmp

    Filesize

    24KB

  • memory/932-0-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/932-1-0x0000000000620000-0x0000000000626000-memory.dmp

    Filesize

    24KB

  • memory/932-2-0x0000000000620000-0x0000000000626000-memory.dmp

    Filesize

    24KB

  • memory/932-3-0x0000000000750000-0x0000000000756000-memory.dmp

    Filesize

    24KB

  • memory/932-17-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB