Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    27/01/2024, 10:46

General

  • Target

    2024-01-27_ff7895c7a250b2d7dde439cdb28345d6_cryptolocker.exe

  • Size

    30KB

  • MD5

    ff7895c7a250b2d7dde439cdb28345d6

  • SHA1

    7cbac253ff6fd09a543518d03a21e22f4ed57e70

  • SHA256

    54d634304a152fe21d8ebb31dbea7ef5fcfce0cccecc62976e1774f8177794d2

  • SHA512

    6c314e607653f6e7e74c03f4ece304d2b4c985c354f157b1d6548c96a92e7ee1f3ee7c4dd8a411fed4d17bd1109a367371f5c93a65a37993c9537e0c00e53ba6

  • SSDEEP

    384:bmM0V/YPvnr801TRoUGPh4TKt6ATt1DqgPa3s/zzoCt9RDB:b7o/2n1TCraU6GD1a4Xt9Rt

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-27_ff7895c7a250b2d7dde439cdb28345d6_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-27_ff7895c7a250b2d7dde439cdb28345d6_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2572
    • C:\Users\Admin\AppData\Local\Temp\rewok.exe
      "C:\Users\Admin\AppData\Local\Temp\rewok.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2260

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\rewok.exe

    Filesize

    30KB

    MD5

    a65d02fc9baa4b9178298bc7c93d8410

    SHA1

    cf482d0d1a9ba7665773ba8d70718600f7879887

    SHA256

    1373d13b4bc7885bcad4c61e131cff44288d5ec5f8075abdac112c8b2521763a

    SHA512

    8a1af4d9e07a96caae9e01295cfc13ccb5858b04c0103bce9cad712020259b6eeb94517df0e43f95c6675d2ba8162b26daa45ab1357eb3659a38d52d26f8aa3c

  • memory/2260-19-0x0000000000260000-0x0000000000266000-memory.dmp

    Filesize

    24KB

  • memory/2572-0-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/2572-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2572-2-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB