Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/05/2024, 02:34

General

  • Target

    2024-05-31_2d10796f998dfe775a540b0740cdd284_cryptolocker.exe

  • Size

    43KB

  • MD5

    2d10796f998dfe775a540b0740cdd284

  • SHA1

    3b751182593bba89cbafaf2dd9bba5410d894f49

  • SHA256

    44bb6c2c0fbb825652c4cb6084beb28a5dc7cfe16615582ce8906f00e71eeefe

  • SHA512

    3d98f07eff9fb9a435a03d586e00fa1752a9e1180a2dd6b09a71d6598560e09c0444cd5d438817aef808e8534ca94651998efb110d2a96cd44b6887fd1163875

  • SSDEEP

    768:bIDOw9UiaCHfjnE0Sf88AvvP1oghYvm9/6DyE9x3h6H:bIDOw9a0Dwo3P1ojvUSD79Ro

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-31_2d10796f998dfe775a540b0740cdd284_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-31_2d10796f998dfe775a540b0740cdd284_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1072
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      PID:3464

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lossy.exe

    Filesize

    43KB

    MD5

    1ba44bf7ae318fe34e6f3fc3a29102c8

    SHA1

    df236a8cec9b81ac53108116211d9a3f949c6b13

    SHA256

    206e990279f99fc38766b73a28bf89c822670c896e1acf9bdf27b4fa348b0315

    SHA512

    a5b75ed1bc7a6b80a84c76c142ca7c27903e92166ce12ac13c3f41c04fc51a15d3408f992ab0183abfef9d27458d0d9df616eb2653dca67191de0b74e6e21d91

  • memory/1072-0-0x0000000002050000-0x0000000002056000-memory.dmp

    Filesize

    24KB

  • memory/1072-1-0x0000000002080000-0x0000000002086000-memory.dmp

    Filesize

    24KB

  • memory/1072-8-0x0000000002050000-0x0000000002056000-memory.dmp

    Filesize

    24KB

  • memory/3464-17-0x00000000020E0000-0x00000000020E6000-memory.dmp

    Filesize

    24KB

  • memory/3464-23-0x00000000020C0000-0x00000000020C6000-memory.dmp

    Filesize

    24KB