Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/05/2024, 12:50

General

  • Target

    2024-05-24_97fc40e3d7dc2c4d48f8613235ce97f6_cryptolocker.exe

  • Size

    42KB

  • MD5

    97fc40e3d7dc2c4d48f8613235ce97f6

  • SHA1

    290128675b847b6189fac98025168fa1c483583c

  • SHA256

    d63ae84bea591dbfa9384b0386a2891c20e2658532ca68df593b65b9074cf1db

  • SHA512

    28f16ff84959751afa81d21a12dd0ba9190de57b72be019aac1b83eae725565e6b221391c146ad26c5693901cbd028ee98a65a04d05869ac180110a723ba2ff8

  • SSDEEP

    768:bCDOw9UiaKHfjnD0S16avdrQFiLjJvtAqtN:bCDOw9aMDooc+vAqtN

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-24_97fc40e3d7dc2c4d48f8613235ce97f6_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-24_97fc40e3d7dc2c4d48f8613235ce97f6_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4584
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      PID:3024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lossy.exe

    Filesize

    42KB

    MD5

    517fc3d717436321f295ae22f084bec5

    SHA1

    b03a3400912265744f11dcf3d78cbfb6d83b2ed6

    SHA256

    a434b508b236c00a8997ba45d4eca8c9cd737f3a7ae556cae08695c9774cd597

    SHA512

    e30dde3f8b3218ef5ad3471f8ea95aafdb0dfa14fccc0db09c30699ec2ec079a66f26d51821a503aa034af9ad040eefcf782ac7223bcf12db56f8e4b9ffc8be3

  • memory/3024-17-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/3024-26-0x0000000002040000-0x0000000002046000-memory.dmp

    Filesize

    24KB

  • memory/3024-20-0x0000000002070000-0x0000000002076000-memory.dmp

    Filesize

    24KB

  • memory/3024-27-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/4584-0-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/4584-1-0x00000000020D0000-0x00000000020D6000-memory.dmp

    Filesize

    24KB

  • memory/4584-2-0x00000000020F0000-0x00000000020F6000-memory.dmp

    Filesize

    24KB

  • memory/4584-9-0x00000000020D0000-0x00000000020D6000-memory.dmp

    Filesize

    24KB

  • memory/4584-18-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB