Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/10/2024, 03:33

General

  • Target

    2024-10-18_295cf4d26e1171b5d8de0b7ccc4e7bc6_cryptolocker.exe

  • Size

    79KB

  • MD5

    295cf4d26e1171b5d8de0b7ccc4e7bc6

  • SHA1

    57224da8fbf03d6a16d72cd3c8b02e5ab9cef45d

  • SHA256

    ab0168b60655c99acbb3005b0d804284a7ed18afd53cccc6ff8e8f7be905de3e

  • SHA512

    d65eae32e9fe4f9535dc73d6fc96ec302c3f4ce4ae5daaea5165b4ac139653a4621157986b28ba1c5095e36d6ee74362b2907c64d3d04a910266fa0c53305489

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUx4:T6a+rdOOtEvwDpjNtHPH

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-18_295cf4d26e1171b5d8de0b7ccc4e7bc6_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-18_295cf4d26e1171b5d8de0b7ccc4e7bc6_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1800
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    79KB

    MD5

    7d485fec148d0ddc796d0686b7de30a3

    SHA1

    f48ecccf268d514a78e505ac48b80c6609531c0f

    SHA256

    f4ccdc0674a401a6789bbc4b0f33a87bd880b9e0e0ed935b772b1dec234faa0d

    SHA512

    d85410c54321b3c30f1ff7e8f8991645d98d7c4471e96eceeef858bd9483d088d85761cc53b4db6d6f470f2535b2456cb2af61c7d3b3ac47890d4e02220021be

  • memory/1800-0-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1800-1-0x0000000000800000-0x0000000000806000-memory.dmp

    Filesize

    24KB

  • memory/1800-2-0x0000000000800000-0x0000000000806000-memory.dmp

    Filesize

    24KB

  • memory/1800-3-0x0000000000820000-0x0000000000826000-memory.dmp

    Filesize

    24KB

  • memory/1800-17-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/3532-19-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/3532-20-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/3532-26-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB