Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    139s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/08/2023, 14:19

General

  • Target

    2a813963a5caedeb4219c8f39caa1806_cryptolocker_JC.exe

  • Size

    64KB

  • MD5

    2a813963a5caedeb4219c8f39caa1806

  • SHA1

    69b08e7a62e681de591b99bb86e8a3b9512badf7

  • SHA256

    07a05e3a636119cd9a5ba381907bd81cb83426ff826d7c81099cdf8273e6fc2c

  • SHA512

    175c9a7644acbc690709663ad6a5548e90bd4981bdb6713c7a5cddef1d9db602d32207db2f7d9921e046df25e5ce25d8368531bea41b3d51e220d56ea99a2457

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAvz:z6a+CdOOtEvwDpjQM

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a813963a5caedeb4219c8f39caa1806_cryptolocker_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\2a813963a5caedeb4219c8f39caa1806_cryptolocker_JC.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3752
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1192

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    64KB

    MD5

    493092832723c5e59662342e27c77c36

    SHA1

    3dbeef8211da9f078581fc537a2f5ba32d716d6d

    SHA256

    3415262fc8b550598ceebe9a7d15b1bb03e5ac2042b0a7d63ef521c6ba3ee197

    SHA512

    705160f933e68b76c8aec1de1baf8694f2237c3533dafec3ac4fb988cdc72cd2345f281e0353a1a6db9d6e777f0cf30b615c17f181073c80e71f434111bef95b

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    64KB

    MD5

    493092832723c5e59662342e27c77c36

    SHA1

    3dbeef8211da9f078581fc537a2f5ba32d716d6d

    SHA256

    3415262fc8b550598ceebe9a7d15b1bb03e5ac2042b0a7d63ef521c6ba3ee197

    SHA512

    705160f933e68b76c8aec1de1baf8694f2237c3533dafec3ac4fb988cdc72cd2345f281e0353a1a6db9d6e777f0cf30b615c17f181073c80e71f434111bef95b

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    64KB

    MD5

    493092832723c5e59662342e27c77c36

    SHA1

    3dbeef8211da9f078581fc537a2f5ba32d716d6d

    SHA256

    3415262fc8b550598ceebe9a7d15b1bb03e5ac2042b0a7d63ef521c6ba3ee197

    SHA512

    705160f933e68b76c8aec1de1baf8694f2237c3533dafec3ac4fb988cdc72cd2345f281e0353a1a6db9d6e777f0cf30b615c17f181073c80e71f434111bef95b

  • memory/1192-151-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/1192-158-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/3752-133-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/3752-134-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/3752-135-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/3752-136-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/3752-157-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB