Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2024, 11:26 UTC

General

  • Target

    2024-10-13_991e1ee91cd9f41e9972d7d109714019_cryptolocker.exe

  • Size

    71KB

  • MD5

    991e1ee91cd9f41e9972d7d109714019

  • SHA1

    df96dc5016a5493a4f31436d8a7daa241ac1d6a4

  • SHA256

    d107006fee531da3b23d321c9ee06a3ab951cf2021d75000a516a1b6246a2010

  • SHA512

    02a8634a4d01fe84f32a7624b4c85d7d887d4097dc5217074d21059e1cd98b68d1688749fb00835f443624bd248c3f47cc35a1ac8ac73f97122639e716e2da33

  • SSDEEP

    768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLa5VccPtNw5FlO:V6QFElP6n+gMQMOtEvwDpjyaLccVNElO

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-13_991e1ee91cd9f41e9972d7d109714019_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-13_991e1ee91cd9f41e9972d7d109714019_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1800
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4668

Network

  • flag-us
    DNS
    emrlogistics.com
    asih.exe
    Remote address:
    8.8.8.8:53
    Request
    emrlogistics.com
    IN A
    Response
    emrlogistics.com
    IN CNAME
    traff-6.hugedomains.com
    traff-6.hugedomains.com
    IN CNAME
    hdr-nlb10-d66bbad0736f8259.elb.us-east-2.amazonaws.com
    hdr-nlb10-d66bbad0736f8259.elb.us-east-2.amazonaws.com
    IN A
    3.140.13.188
    hdr-nlb10-d66bbad0736f8259.elb.us-east-2.amazonaws.com
    IN A
    18.119.154.66
  • flag-us
    DNS
    64.159.190.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    64.159.190.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    83.210.23.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    83.210.23.2.in-addr.arpa
    IN PTR
    Response
    83.210.23.2.in-addr.arpa
    IN PTR
    a2-23-210-83deploystaticakamaitechnologiescom
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    43.58.199.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    43.58.199.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    200.163.202.172.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    200.163.202.172.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    171.39.242.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    171.39.242.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    98.117.19.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    98.117.19.2.in-addr.arpa
    IN PTR
    Response
    98.117.19.2.in-addr.arpa
    IN PTR
    a2-19-117-98deploystaticakamaitechnologiescom
  • flag-us
    DNS
    88.210.23.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    88.210.23.2.in-addr.arpa
    IN PTR
    Response
    88.210.23.2.in-addr.arpa
    IN PTR
    a2-23-210-88deploystaticakamaitechnologiescom
  • flag-us
    DNS
    11.227.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    11.227.111.52.in-addr.arpa
    IN PTR
    Response
  • 3.140.13.188:443
    emrlogistics.com
    asih.exe
    260 B
    5
  • 18.119.154.66:443
    emrlogistics.com
    asih.exe
    260 B
    5
  • 3.140.13.188:443
    emrlogistics.com
    asih.exe
    260 B
    5
  • 18.119.154.66:443
    emrlogistics.com
    asih.exe
    260 B
    5
  • 3.140.13.188:443
    emrlogistics.com
    asih.exe
    260 B
    5
  • 18.119.154.66:443
    emrlogistics.com
    asih.exe
    260 B
    5
  • 3.140.13.188:443
    emrlogistics.com
    asih.exe
    260 B
    5
  • 18.119.154.66:443
    emrlogistics.com
    asih.exe
    104 B
    2
  • 8.8.8.8:53
    emrlogistics.com
    dns
    asih.exe
    62 B
    193 B
    1
    1

    DNS Request

    emrlogistics.com

    DNS Response

    3.140.13.188
    18.119.154.66

  • 8.8.8.8:53
    64.159.190.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    64.159.190.20.in-addr.arpa

  • 8.8.8.8:53
    83.210.23.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    83.210.23.2.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    43.58.199.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    43.58.199.20.in-addr.arpa

  • 8.8.8.8:53
    200.163.202.172.in-addr.arpa
    dns
    74 B
    160 B
    1
    1

    DNS Request

    200.163.202.172.in-addr.arpa

  • 8.8.8.8:53
    171.39.242.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    171.39.242.20.in-addr.arpa

  • 8.8.8.8:53
    98.117.19.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    98.117.19.2.in-addr.arpa

  • 8.8.8.8:53
    88.210.23.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    88.210.23.2.in-addr.arpa

  • 8.8.8.8:53
    11.227.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    11.227.111.52.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    71KB

    MD5

    93f8c105211c3d3fcbb20ab30a56373e

    SHA1

    3fce8fe7a02ce17e1715bcd744988ef740de77d9

    SHA256

    b8b228706be96c6619b84e5e5d8d099c9bae57d609163a17cf2df7d19ed2229d

    SHA512

    c7bd2272bd51b259d7bd6bdd2a30695f38f11b9453470b368b75d6042707c2d38432b56e448c34a78e863da3dd477336be53b417e3abce61c8432f9ed27395f0

  • memory/1800-0-0x0000000002310000-0x0000000002316000-memory.dmp

    Filesize

    24KB

  • memory/1800-1-0x0000000002310000-0x0000000002316000-memory.dmp

    Filesize

    24KB

  • memory/1800-2-0x0000000002230000-0x0000000002236000-memory.dmp

    Filesize

    24KB

  • memory/4668-18-0x0000000001F70000-0x0000000001F76000-memory.dmp

    Filesize

    24KB

  • memory/4668-17-0x00000000021E0000-0x00000000021E6000-memory.dmp

    Filesize

    24KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.