Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/06/2024, 23:32

General

  • Target

    2024-06-24_dfaa3f658938b10dc461f368d0bcaf8a_cryptolocker.exe

  • Size

    45KB

  • MD5

    dfaa3f658938b10dc461f368d0bcaf8a

  • SHA1

    73279f3e07a98c57a14429174bcf25196c25fbcf

  • SHA256

    d146d33d5fccd05b4254a572ce854248ecf0430b76244bb0e91635ec049c8fbe

  • SHA512

    cb4b82f4a57a09c3305b3e7f79a443bb9f315394ff45554701bed7cd7f44d52769544bc34a99aa3332357640bb74f50352aa790f7fe35af054b0e6802ec25592

  • SSDEEP

    768:P6LsoEEeegiZPvEhHS5+Mh/QtOOtEvwDpjBpaD3TUogs/VXpAPX4:P6QFElP6k+MRQMOtEvwDpjBQpVXE4

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-24_dfaa3f658938b10dc461f368d0bcaf8a_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-24_dfaa3f658938b10dc461f368d0bcaf8a_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3644
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    45KB

    MD5

    ee961f004b71e4ed917f3c22275eea83

    SHA1

    30acc9cca298040e89afb0328064ed90ea7eb0ab

    SHA256

    9d216118d5f6e23992b7feac22871441b7f60b8a8d0f6ae5a7ea2f89c8146dc7

    SHA512

    877425fb6b69c9efac49ea5bee08755cfef3765c3ca1599a7950b3df34e15e84ed4379211518720263b4f48c3fed602157f8f23315ec4d344f32a8bcdcf5c4bf

  • memory/112-17-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/112-20-0x00000000006D0000-0x00000000006D6000-memory.dmp

    Filesize

    24KB

  • memory/112-26-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/112-27-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/3644-0-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/3644-1-0x0000000002060000-0x0000000002066000-memory.dmp

    Filesize

    24KB

  • memory/3644-2-0x0000000002080000-0x0000000002086000-memory.dmp

    Filesize

    24KB

  • memory/3644-9-0x0000000002060000-0x0000000002066000-memory.dmp

    Filesize

    24KB

  • memory/3644-18-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB