Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    24/02/2024, 09:46

General

  • Target

    2024-02-24_a7bbefe973f3a86d80b5211481a32adc_cryptolocker.exe

  • Size

    78KB

  • MD5

    a7bbefe973f3a86d80b5211481a32adc

  • SHA1

    8bec3fcf421b5ea32cb2330934a23e932065b90b

  • SHA256

    e8f07108a08e4a6e68eb29cc45c12354ffeac1206d590dca4aeaed3546e59bc0

  • SHA512

    8b9b7bdf7d05449630b2fccd1b8eab7c23cfc606ffa8f9b77339a88ecb9fc14a61377e500e94b8440fe7a29c5e20c9734e9f46af986324ab0e816f4fc30effe7

  • SSDEEP

    1536:vj+jsMQMOtEvwDpj5HwYYTjipvF2hBfIuf7W:vCjsIOtEvwDpj5H9YvQd2O

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-24_a7bbefe973f3a86d80b5211481a32adc_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-24_a7bbefe973f3a86d80b5211481a32adc_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1660
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:3004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    78KB

    MD5

    9a9b66183ca7aaf90832039165646b8e

    SHA1

    abb332c5feb12b1fb1114704d9539551f479cae3

    SHA256

    b19c470225cc48f6a87e60f1aa73eb8c790c12bbbced9b685952f3eeabd80fa3

    SHA512

    dfa267090c72af628418fb498dbbf8bc75b8a93347dd39b851db7fa19d3cacba275aa33d258300b82f587c48bc58b7c289f0e86031c6315d43ad4a0dedb45cd6

  • memory/1660-0-0x0000000000430000-0x0000000000436000-memory.dmp

    Filesize

    24KB

  • memory/1660-1-0x0000000000430000-0x0000000000436000-memory.dmp

    Filesize

    24KB

  • memory/1660-2-0x0000000000470000-0x0000000000476000-memory.dmp

    Filesize

    24KB

  • memory/3004-15-0x0000000000210000-0x0000000000216000-memory.dmp

    Filesize

    24KB

  • memory/3004-22-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB