Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24/02/2024, 04:52

General

  • Target

    2024-02-24_763b4b23e0bd9cb639e22328965ab90f_cryptolocker.exe

  • Size

    50KB

  • MD5

    763b4b23e0bd9cb639e22328965ab90f

  • SHA1

    34ac92cf5b3217d022a79ee9e60fcd9acd3d2c7b

  • SHA256

    7895cdd946d3c8ea939f59826209fc7ef9c9744ef5fca18080426c45496f5d49

  • SHA512

    06b448108cd897b1ea2d32dfc6ec468c4c9c76b49e24d16e2a3b74b52030c0b974fc1ac34dd7531d4f5bd44894443c30b73e122231a8a72d7df4782c7fd929c3

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb6Impy8:BbdDmjr+OtEvwDpjM/

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 6 IoCs
  • Detection of Cryptolocker Samples 3 IoCs
  • UPX dump on OEP (original entry point) 6 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-24_763b4b23e0bd9cb639e22328965ab90f_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-24_763b4b23e0bd9cb639e22328965ab90f_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1504
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2176

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    50KB

    MD5

    8e743cabe024d1ea44dd0ed6095b1893

    SHA1

    7ceb3eb93dc663d2a7ecfe10efad4e1dca5e096e

    SHA256

    94818d27b1c2a6ca91da4e0785a538420e9251f213a5c37a173254406c2e9ac0

    SHA512

    1301d3fccba18a9a413078243c3009298bae9d1c2740d98deb87a268ea64703f657246f3ab95058148bb29221cf3007086b5bd6c969fa5a6d28d834529ca8237

  • memory/1504-0-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1504-1-0x0000000000420000-0x0000000000426000-memory.dmp

    Filesize

    24KB

  • memory/1504-2-0x0000000000460000-0x0000000000466000-memory.dmp

    Filesize

    24KB

  • memory/1504-8-0x0000000000420000-0x0000000000426000-memory.dmp

    Filesize

    24KB

  • memory/1504-15-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1504-12-0x0000000002BC0000-0x0000000002BD0000-memory.dmp

    Filesize

    64KB

  • memory/2176-17-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2176-26-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB