Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    18/02/2024, 03:39

General

  • Target

    2024-02-18_71e70005cc72e17e2c50c9f7937bc2d0_cryptolocker.exe

  • Size

    36KB

  • MD5

    71e70005cc72e17e2c50c9f7937bc2d0

  • SHA1

    6029d6ca2bf1dcf7401bd08568b9297bba43304b

  • SHA256

    4a37718ed1d5562998067917a085fd11e360c2026b141e12df963b878bc22a15

  • SHA512

    0103bdefc90ea3bcd5aa12433e1ae98fbd5f6c038116dd93220508f58822a9c7370905450f1f8e8d64fe01dfcf259f5bc5ecdc118c9f4849a760fbc94e27b373

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBVaD3TP7DFCW:X6QFElP6n+gJQMOtEvwDpjBmzDUW

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-18_71e70005cc72e17e2c50c9f7937bc2d0_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-18_71e70005cc72e17e2c50c9f7937bc2d0_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2224
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    36KB

    MD5

    3af533734b17ae1cc4e7b641a6aa6296

    SHA1

    d748204989d576c2580296ed291a726fa07d6702

    SHA256

    995860fa520c2cd039a7000e3016ae0b701e5e1ff2483a7294f85f26a54b9e1b

    SHA512

    8d014378e4bd46aebbbf0fa5bd783e683e5053390b679331c210bede59aaf314337455b154bfc2fd641dd0891df64e36e1be924c0cdcaea2444cd1afe85a172c

  • memory/1724-16-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

  • memory/1724-15-0x00000000002B0000-0x00000000002B6000-memory.dmp

    Filesize

    24KB

  • memory/2224-0-0x00000000003C0000-0x00000000003C6000-memory.dmp

    Filesize

    24KB

  • memory/2224-1-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB

  • memory/2224-8-0x00000000003C0000-0x00000000003C6000-memory.dmp

    Filesize

    24KB