Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/06/2024, 23:22

General

  • Target

    2024-06-29_50aed51ebfb1be915479048d08ab3cb7_cryptolocker.exe

  • Size

    39KB

  • MD5

    50aed51ebfb1be915479048d08ab3cb7

  • SHA1

    766ba5638a08ae0af25b57e3853fc59fc437e5ad

  • SHA256

    72de26437fb868561789fa3c22a40225d06d8eb7072a02f3068fefdc9298dbc9

  • SHA512

    c0634e143bebf33d9c995a0fd07d728b37acc2cdbb80636a953ac2d55df2414779bcc6000a2d5b73a7716cda0e7f37b5df4df9a984d336598dcdaff90c88029a

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBVaD3TP7DFCw02:X6QFElP6n+gJQMOtEvwDpjBmzDU52

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-29_50aed51ebfb1be915479048d08ab3cb7_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-29_50aed51ebfb1be915479048d08ab3cb7_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:5052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    40KB

    MD5

    e9c8b84d0dc9f2e218845ee96e8313ea

    SHA1

    7a2629dbc68616af4bea4ee3374c66bc78d198ee

    SHA256

    6d7cb16b130f267848411c0ebd0e578b3591983a1989736fba04be7af743b4fb

    SHA512

    a3a932bbc09e14e87c95cbf58501f57a48600e325d6a6cadc9382c6e40359a1c38da9a499f58e9331cc026d3c611535ff4b3fca9d89be3c01e2b36ec52263eb8

  • memory/1628-0-0x00000000020E0000-0x00000000020E6000-memory.dmp

    Filesize

    24KB

  • memory/1628-8-0x00000000020E0000-0x00000000020E6000-memory.dmp

    Filesize

    24KB

  • memory/1628-1-0x0000000002100000-0x0000000002106000-memory.dmp

    Filesize

    24KB

  • memory/5052-23-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB

  • memory/5052-17-0x00000000005E0000-0x00000000005E6000-memory.dmp

    Filesize

    24KB