Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    176s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    18/01/2024, 23:03 UTC

General

  • Target

    2024-01-18_8cf547c807ade177842b5bdb8b6d581b_cryptolocker.exe

  • Size

    58KB

  • MD5

    8cf547c807ade177842b5bdb8b6d581b

  • SHA1

    a0106d7f6343c594948e73a3d52f872f8285e9a0

  • SHA256

    26b765ec77613dd198b854e6e4578d264ccf6b8af8f8a8eb32e6c97f9e6f4bc2

  • SHA512

    d74b603f77c48660460ec85ba623648a38613149044e85084b37db81de0286b1dc726d02401d63c42585517288b9677a8e0caf7a58a32e1e7148cd031f15bd78

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb614f:BbdDmjr+OtEvwDpjMU

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 3 IoCs
  • UPX dump on OEP (original entry point) 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-18_8cf547c807ade177842b5bdb8b6d581b_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-18_8cf547c807ade177842b5bdb8b6d581b_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1088
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2720

Network

  • flag-us
    DNS
    emrlogistics.com
    asih.exe
    Remote address:
    8.8.8.8:53
    Request
    emrlogistics.com
    IN A
    Response
    emrlogistics.com
    IN CNAME
    traff-5.hugedomains.com
    traff-5.hugedomains.com
    IN CNAME
    hdr-nlb7-aebd5d615260636b.elb.us-east-1.amazonaws.com
    hdr-nlb7-aebd5d615260636b.elb.us-east-1.amazonaws.com
    IN A
    54.161.222.85
    hdr-nlb7-aebd5d615260636b.elb.us-east-1.amazonaws.com
    IN A
    34.205.242.146
  • 54.161.222.85:443
    emrlogistics.com
    asih.exe
    152 B
    3
  • 34.205.242.146:443
    emrlogistics.com
    asih.exe
    152 B
    3
  • 54.161.222.85:443
    emrlogistics.com
    asih.exe
    152 B
    3
  • 34.205.242.146:443
    emrlogistics.com
    asih.exe
    152 B
    3
  • 54.161.222.85:443
    emrlogistics.com
    asih.exe
    152 B
    3
  • 34.205.242.146:443
    emrlogistics.com
    asih.exe
    152 B
    3
  • 54.161.222.85:443
    emrlogistics.com
    asih.exe
    152 B
    3
  • 8.8.8.8:53
    emrlogistics.com
    dns
    asih.exe
    62 B
    192 B
    1
    1

    DNS Request

    emrlogistics.com

    DNS Response

    54.161.222.85
    34.205.242.146

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    58KB

    MD5

    9f51e8a4b5b233f7e08f66bbdf1ded3a

    SHA1

    685ed24e60918f88c5686c469f6c954e786e5273

    SHA256

    fdffabaecaecb0bb8721ed606f5e078a15f77925e8b20ca8ce8ed022ea3cd19f

    SHA512

    c2828e7cd15dda5e1870a890d9a7d5d8471d031dc455298b90c932dd0bf6a47cd52a32b2e6eb4b6b19d189d3713bfa9129d59bf99a130cbe4518e54400f25c72

  • memory/1088-0-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1088-1-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/1088-2-0x0000000000330000-0x0000000000336000-memory.dmp

    Filesize

    24KB

  • memory/1088-4-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/1088-15-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2720-16-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2720-18-0x0000000000210000-0x0000000000216000-memory.dmp

    Filesize

    24KB

  • memory/2720-22-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2720-26-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.