Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    06/03/2024, 09:38

General

  • Target

    2024-03-06_e551b36c9e613e67f2927a52a05daca1_cryptolocker.exe

  • Size

    69KB

  • MD5

    e551b36c9e613e67f2927a52a05daca1

  • SHA1

    a246889746e714323033b4e8d505ffb04e250388

  • SHA256

    0625daa264e5248023dcb1650620c492bc6a64fa3a4722c3be361eca774aa16c

  • SHA512

    8ee0c8ae507c949f9a9b3e089834ea0dba1dd62b81c98632a72eab2b088ac6a378a022a4dc22bfbe23df0fef35fae7c63f71007aa11744ed24ecfe32f6fba7c5

  • SSDEEP

    1536:Dk/xY0sllyGQMOtEvwDpjwycDtKkQZQRKb61vSbgZ3QzNKUHLS:DW60sllyWOtEvwDpjwF85k

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-06_e551b36c9e613e67f2927a52a05daca1_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-06_e551b36c9e613e67f2927a52a05daca1_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1196
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    69KB

    MD5

    ed54c82250df81480c74d471a5ad2be2

    SHA1

    443bb62579a66242e9c4c0001a527e0d29ec8f28

    SHA256

    253113642e91d2fed1876a5c73c61a0fb82b8aab3f0bd25d8c95e83ca229bcba

    SHA512

    5ccddab6561ab9ea4614ef18908c0f550d97524f87ccd57e34adba4574add95b60724b52410849e0aa433e9d279e2179fb885b5f7889820f6f075bb0f11e5248

  • memory/1196-0-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/1196-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/1196-2-0x0000000000600000-0x0000000000606000-memory.dmp

    Filesize

    24KB

  • memory/1196-9-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/1196-13-0x0000000002840000-0x000000000284B000-memory.dmp

    Filesize

    44KB

  • memory/1196-16-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/1432-18-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/1432-19-0x0000000000480000-0x0000000000486000-memory.dmp

    Filesize

    24KB

  • memory/1432-21-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB