Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    26/01/2024, 22:24

General

  • Target

    2024-01-26_a95ad62639bfdc97d779a6ce2b1207ca_cryptolocker.exe

  • Size

    41KB

  • MD5

    a95ad62639bfdc97d779a6ce2b1207ca

  • SHA1

    32864fd592297bd7f7f64a39165f8edf6abc4779

  • SHA256

    12e86354abbf0383ec22d6588a95e5b72f9729fff5ac6fe8c50852d63576dfce

  • SHA512

    ddb2bcf96d0531a1caf26fc8c62fa91d4caae6001d068d12f3fb1ee2ac8982caeb5a9c4e6737c5fe5e443f4f6fc74c01aba0f5c0884ba9087388b0b4646ea76f

  • SSDEEP

    768:b7o/2n1TCraU6GD1a4X0WcO+wMVm+slAMvcWd:bc/y2lkF0+B23

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-26_a95ad62639bfdc97d779a6ce2b1207ca_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-26_a95ad62639bfdc97d779a6ce2b1207ca_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:624
    • C:\Users\Admin\AppData\Local\Temp\rewok.exe
      "C:\Users\Admin\AppData\Local\Temp\rewok.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\rewok.exe

    Filesize

    41KB

    MD5

    7ddcd13739abe9640c0d5d4b1728f6db

    SHA1

    57601d9665a9733fea85bb505f27d7bf4ce84273

    SHA256

    4d501c329848c51681aaa83ec3b8a7309b365d1172c88c8623a73ae705be4204

    SHA512

    44c20f1ed6797bfa1024a68079117c118a449a6852045d772671ffd873a0fd3313260856c72a86b7c253142610541d24021e5a461e64c7bccc016fecf9f8da01

  • memory/624-0-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB

  • memory/624-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/624-8-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB

  • memory/2000-19-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB