Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/05/2024, 06:25 UTC

General

  • Target

    2024-05-31_1a4cc52e1bd1864f19160b5ce581ace1_cryptolocker.exe

  • Size

    91KB

  • MD5

    1a4cc52e1bd1864f19160b5ce581ace1

  • SHA1

    483537b0276d2264f70fdddf75603b186cd7582b

  • SHA256

    0f58d3a783d8354331bb218e250df2dea605825d2fbb4832ea24957d1e739940

  • SHA512

    6778b8fb5ffb779cb9683a8ecb14969ee61e31281e123144365c2f20a96764f213e5df87651effd64616add557edac00053164f095f705d3dbca9323d684f18e

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAA/E:n6a+1SEOtEvwDpjYYvQd2PL

Score
9/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • UPX dump on OEP (original entry point) 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-31_1a4cc52e1bd1864f19160b5ce581ace1_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-31_1a4cc52e1bd1864f19160b5ce581ace1_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3612
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1952

Network

  • flag-us
    DNS
    8.8.8.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.8.8.8.in-addr.arpa
    IN PTR
    Response
    8.8.8.8.in-addr.arpa
    IN PTR
    dnsgoogle
  • flag-us
    DNS
    emrlogistics.com
    asih.exe
    Remote address:
    8.8.8.8:53
    Request
    emrlogistics.com
    IN A
    Response
    emrlogistics.com
    IN CNAME
    traff-3.hugedomains.com
    traff-3.hugedomains.com
    IN CNAME
    hdr-nlb4-0bbd2e21834cb637.elb.us-east-2.amazonaws.com
    hdr-nlb4-0bbd2e21834cb637.elb.us-east-2.amazonaws.com
    IN A
    3.18.7.81
    hdr-nlb4-0bbd2e21834cb637.elb.us-east-2.amazonaws.com
    IN A
    3.19.116.195
  • flag-us
    DNS
    228.249.119.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    228.249.119.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    144.107.17.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    144.107.17.2.in-addr.arpa
    IN PTR
    Response
    144.107.17.2.in-addr.arpa
    IN PTR
    a2-17-107-144deploystaticakamaitechnologiescom
  • flag-us
    DNS
    23.159.190.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    23.159.190.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    104.219.191.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    104.219.191.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    86.23.85.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    86.23.85.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    198.187.3.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    198.187.3.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    172.210.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.210.232.199.in-addr.arpa
    IN PTR
    Response
  • 3.18.7.81:443
    emrlogistics.com
    asih.exe
    260 B
    5
  • 3.19.116.195:443
    emrlogistics.com
    asih.exe
    260 B
    5
  • 3.18.7.81:443
    emrlogistics.com
    asih.exe
    260 B
    5
  • 3.19.116.195:443
    emrlogistics.com
    asih.exe
    260 B
    5
  • 3.18.7.81:443
    emrlogistics.com
    asih.exe
    260 B
    5
  • 3.19.116.195:443
    emrlogistics.com
    asih.exe
    260 B
    5
  • 3.18.7.81:443
    emrlogistics.com
    asih.exe
    260 B
    5
  • 3.19.116.195:443
    emrlogistics.com
    asih.exe
    104 B
    2
  • 8.8.8.8:53
    8.8.8.8.in-addr.arpa
    dns
    66 B
    90 B
    1
    1

    DNS Request

    8.8.8.8.in-addr.arpa

  • 8.8.8.8:53
    emrlogistics.com
    dns
    asih.exe
    62 B
    192 B
    1
    1

    DNS Request

    emrlogistics.com

    DNS Response

    3.18.7.81
    3.19.116.195

  • 8.8.8.8:53
    228.249.119.40.in-addr.arpa
    dns
    73 B
    159 B
    1
    1

    DNS Request

    228.249.119.40.in-addr.arpa

  • 8.8.8.8:53
    144.107.17.2.in-addr.arpa
    dns
    71 B
    135 B
    1
    1

    DNS Request

    144.107.17.2.in-addr.arpa

  • 8.8.8.8:53
    23.159.190.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    23.159.190.20.in-addr.arpa

  • 8.8.8.8:53
    104.219.191.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    104.219.191.52.in-addr.arpa

  • 8.8.8.8:53
    86.23.85.13.in-addr.arpa
    dns
    70 B
    144 B
    1
    1

    DNS Request

    86.23.85.13.in-addr.arpa

  • 8.8.8.8:53
    198.187.3.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    198.187.3.20.in-addr.arpa

  • 8.8.8.8:53
    172.210.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.210.232.199.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    91KB

    MD5

    245eaf9b60cbe0cb8452e00c158330a3

    SHA1

    ac612e5582698ecb743860811c5a888617e59f8d

    SHA256

    d51891bab8abe993ccb7f4f6d3cadd2a741fdbc3a0d77360c07945372396f5e5

    SHA512

    c2260f78cdd04b1a7139bb23504cffc087c6f514489a35a84b6d990e07cbca39463003eb51f30a324e5d441b0a8980d37d81ca14559a19ec91c72960531c4cfc

  • memory/1952-25-0x0000000000620000-0x0000000000626000-memory.dmp

    Filesize

    24KB

  • memory/1952-19-0x0000000000750000-0x0000000000756000-memory.dmp

    Filesize

    24KB

  • memory/1952-26-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/3612-0-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/3612-1-0x0000000000840000-0x0000000000846000-memory.dmp

    Filesize

    24KB

  • memory/3612-3-0x0000000000860000-0x0000000000866000-memory.dmp

    Filesize

    24KB

  • memory/3612-9-0x0000000000840000-0x0000000000846000-memory.dmp

    Filesize

    24KB

  • memory/3612-18-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.