Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12/02/2024, 19:22

General

  • Target

    2024-02-12_25215e211c833719bd917b118c5e5c3a_cryptolocker.exe

  • Size

    83KB

  • MD5

    25215e211c833719bd917b118c5e5c3a

  • SHA1

    11258a1cd600f3dfcf01f12592cf38d788eb651e

  • SHA256

    4b2bd1fde41b8f3178f874853bd08a949b858d97c6df2bd1587a0c8e65b42827

  • SHA512

    e457394e2c70f4e943d8333ea6e015073483be6180149621c8ba7c9509411a7e3462963cb958bc1a613d12fcdc0e45d68a501e3f66c1a8a55ef60570721a4c5f

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjyaLccVNlVSLQK:V6a+pOtEvwDpjvpM

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-12_25215e211c833719bd917b118c5e5c3a_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-12_25215e211c833719bd917b118c5e5c3a_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2468
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1240

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    83KB

    MD5

    2d668f4782104a7a235e794d83456ffe

    SHA1

    c0f6cefd8ca57bbc771220e87905f381329b83e6

    SHA256

    a60cb62befe4be24d7194385ce5a66257a948d08eaf4b7c0acee1751cf6f1e45

    SHA512

    e98aa15d69a24f64e16c8fbefe69dbd2a5c9d2b0ff03676ee645981a254fe614d407c58283ec9b2fadd20d58788513df583a0e228f889ea5dc69e912ecb418e9

  • memory/1240-15-0x00000000005B0000-0x00000000005B6000-memory.dmp

    Filesize

    24KB

  • memory/1240-19-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/2468-0-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2468-1-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB

  • memory/2468-2-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB