Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    14/02/2024, 17:21 UTC

General

  • Target

    2024-02-14_a547ee70522b5f36c97dd2b62bef643f_cryptolocker.exe

  • Size

    48KB

  • MD5

    a547ee70522b5f36c97dd2b62bef643f

  • SHA1

    d29acaba6e5a4e8a238130cb2a1404c41ee330d5

  • SHA256

    cb40e57788298f5a5f670bbd66c62001e0fd91cd0a77401a5043c1f7887ad45e

  • SHA512

    3ddba0efc652fb291b7e5bd352037389801aabb5857d8e6e4d0ffbf7309af0c8561aa45f9c03f46f7c14d13ac5068c8512bdb6e2ffccb1ae412a10168bda52b4

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjeJQ7pojakNMw:V6a+pOtEvwDpjhw

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-14_a547ee70522b5f36c97dd2b62bef643f_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-14_a547ee70522b5f36c97dd2b62bef643f_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1640

Network

  • flag-us
    DNS
    emrlogistics.com
    asih.exe
    Remote address:
    8.8.8.8:53
    Request
    emrlogistics.com
    IN A
    Response
    emrlogistics.com
    IN CNAME
    traff-6.hugedomains.com
    traff-6.hugedomains.com
    IN CNAME
    hdr-nlb10-d66bbad0736f8259.elb.us-east-2.amazonaws.com
    hdr-nlb10-d66bbad0736f8259.elb.us-east-2.amazonaws.com
    IN A
    18.119.154.66
    hdr-nlb10-d66bbad0736f8259.elb.us-east-2.amazonaws.com
    IN A
    3.140.13.188
  • 18.119.154.66:443
    emrlogistics.com
    asih.exe
    152 B
    3
  • 3.140.13.188:443
    emrlogistics.com
    asih.exe
    152 B
    3
  • 18.119.154.66:443
    emrlogistics.com
    asih.exe
    152 B
    3
  • 3.140.13.188:443
    emrlogistics.com
    asih.exe
    152 B
    3
  • 18.119.154.66:443
    emrlogistics.com
    asih.exe
    152 B
    3
  • 3.140.13.188:443
    emrlogistics.com
    asih.exe
    152 B
    3
  • 18.119.154.66:443
    emrlogistics.com
    asih.exe
    152 B
    3
  • 3.140.13.188:443
    emrlogistics.com
    asih.exe
    52 B
    1
  • 8.8.8.8:53
    emrlogistics.com
    dns
    asih.exe
    62 B
    193 B
    1
    1

    DNS Request

    emrlogistics.com

    DNS Response

    18.119.154.66
    3.140.13.188

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    48KB

    MD5

    4997c3e15167b39bce1a7916e615791a

    SHA1

    aaafb0b9ae2c4bc8ca5a5c4b205ba1a57661dda1

    SHA256

    8878491b08dde5b6a9daf98e04ae44a001f44fe26ed114c76404e1b8900bae5e

    SHA512

    086ebf2bc9bab925c86a1e290fdff3445d83dda280c2f3215669a18beee15e0e8c774a171a70bac70374181fcbbdba63f1ce5264da71db9a66a6a36cde10a0f6

  • memory/1640-15-0x00000000004A0000-0x00000000004A6000-memory.dmp

    Filesize

    24KB

  • memory/1640-17-0x00000000002D0000-0x00000000002D6000-memory.dmp

    Filesize

    24KB

  • memory/1720-0-0x0000000000430000-0x0000000000436000-memory.dmp

    Filesize

    24KB

  • memory/1720-1-0x0000000000460000-0x0000000000466000-memory.dmp

    Filesize

    24KB

  • memory/1720-3-0x0000000000430000-0x0000000000436000-memory.dmp

    Filesize

    24KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.