Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    28/01/2024, 03:33

General

  • Target

    2024-01-28_940bbbe16537cd9530880f6ddb301944_cryptolocker.exe

  • Size

    41KB

  • MD5

    940bbbe16537cd9530880f6ddb301944

  • SHA1

    6a0716162dc968a3acbf820b15a20177093f059a

  • SHA256

    b237d394239901d8c724faeca0c4163d61ef365f680dc491814929076dfe38aa

  • SHA512

    efd321772c1099457005da59d9d307719090078b5b8dc32f2cfc14f7927de9fde6048f33b861af0c2cca3ed6851abfda9bc8ad5d9903fe7d0244199edf9279fd

  • SSDEEP

    768:b7o/2n1TCraU6GD1a4X0WcO+wMVm+slAMRqB:bc/y2lkF0+BjB

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-28_940bbbe16537cd9530880f6ddb301944_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-28_940bbbe16537cd9530880f6ddb301944_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Users\Admin\AppData\Local\Temp\rewok.exe
      "C:\Users\Admin\AppData\Local\Temp\rewok.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\rewok.exe

    Filesize

    41KB

    MD5

    e98ed5977a1db40fc32501a6cc5f9a70

    SHA1

    a975a0ea134f396382f3692737b93ee733557607

    SHA256

    5acc50f2f6a341971862a787160924a9f7cf2c60eb3e50854b3156f6c4604cd1

    SHA512

    8661bb6221c07e568b018ad2edc086c5fcde41d3e186e65e0511251fd49c407acc930500d48035498e430ed08eac18fdcde5f0a2eb65da3dea6efac3a992beee

  • memory/2240-0-0x00000000005B0000-0x00000000005B6000-memory.dmp

    Filesize

    24KB

  • memory/2240-1-0x00000000005B0000-0x00000000005B6000-memory.dmp

    Filesize

    24KB

  • memory/2240-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB