Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/06/2024, 06:26

General

  • Target

    2024-06-13_3b9f73c31b4046361e586a1898b5b593_cryptolocker.exe

  • Size

    70KB

  • MD5

    3b9f73c31b4046361e586a1898b5b593

  • SHA1

    975d7cfe600ebb117179d7850aeab60566599356

  • SHA256

    c1dc972a7ce79be04cc93308489f0e1e20608bf4cbee40a0cdd075d8c9399c7e

  • SHA512

    a4b9aad6e8c0aba9e63f881baa4e00f140d7ed624fe9a80fdc6c6668b4a957f540607cf23531ca2b7acad7e3ee60eca40f48fa53cdb5fb5c0b8a5e0303c1adba

  • SSDEEP

    768:XS5nQJ24LR1bytOOtEvwDpjNbZ7uyA36S7MpxRXrZSUNsYD/dZ:i5nkFGMOtEvwDpjNbwQEI8UZDj

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • Detects executables built or packed with MPress PE compressor 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-13_3b9f73c31b4046361e586a1898b5b593_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-13_3b9f73c31b4046361e586a1898b5b593_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1168
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:4268

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    70KB

    MD5

    49d193a0dbddcdff10b9f1cbf70d3220

    SHA1

    899d8d9f52fe8edfbc119cea43e531a059b565d4

    SHA256

    f3986b4e95361a44977fd6a182a0c589084214e6c33eb87c9142f9307ba6bb43

    SHA512

    d0745e726cff87b4de2bc7dd1b9a5f085a460cfb5b0d4f9c09e2c94b8fbd9a3a00bae347ec1416b630a1e7a5fa25c44cac8fb2f8a12c8f3d2f41e564ad6e4b69

  • memory/1168-0-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/1168-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/1168-2-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/1168-9-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/1168-18-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/4268-26-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB