Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/07/2024, 22:35

General

  • Target

    2024-07-07_9e85d2f76e74a0f6b7d4feb208177bce_cryptolocker.exe

  • Size

    43KB

  • MD5

    9e85d2f76e74a0f6b7d4feb208177bce

  • SHA1

    aac72dda1b04fcbf01f7782cc02d6982774878c7

  • SHA256

    b018f79823185aff50e17510dd9027c11d1b79b934f2228484391673ad021cac

  • SHA512

    de6a0d8da9b657d13d7c66e31aa87c404e6a9414f9a6b636232f221ec915cb6c6ec17bea7ffe44ac192d41b5d661b5289d6600c551bcfa272702c80e4d0418b9

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaac4HK/wSvuQTCyD/95WD:X6QFElP6n+gJQMOtEvwDpjBsYK/fbDFo

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-07-07_9e85d2f76e74a0f6b7d4feb208177bce_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-07-07_9e85d2f76e74a0f6b7d4feb208177bce_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3092
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3480

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    43KB

    MD5

    a8240d71684c878118ef135a7b861fdd

    SHA1

    86792b8442d740f347c98898e6aafe0935836833

    SHA256

    59eacc6f8665b637c31b5a799e526b0ad22242b5d8dc0fd14758ca5e9d76b134

    SHA512

    b55acb44aaf9e6a04e0b454b582d17237767838e913b5d560b6c986c5a1fc88f7f08cb5a5ee562cfca77622674ecd1f8f9055556b913d9b319443954c4d55792

  • memory/3092-0-0x0000000002280000-0x0000000002286000-memory.dmp

    Filesize

    24KB

  • memory/3092-1-0x0000000002280000-0x0000000002286000-memory.dmp

    Filesize

    24KB

  • memory/3092-2-0x0000000002180000-0x0000000002186000-memory.dmp

    Filesize

    24KB

  • memory/3480-17-0x00000000005C0000-0x00000000005C6000-memory.dmp

    Filesize

    24KB

  • memory/3480-23-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB