Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07/03/2024, 05:53 UTC

General

  • Target

    2024-03-07_d662f14c994f642d32d55fab8cbdfb27_cryptolocker.exe

  • Size

    63KB

  • MD5

    d662f14c994f642d32d55fab8cbdfb27

  • SHA1

    9405b3d9fc6d678a9b185b9cdfaeba86a5017c85

  • SHA256

    dbdcc4cbd95e6aaa23aca97c162c869e800aa687fd41dd062016381def8151aa

  • SHA512

    2a4dbdc7b61dee73db6f3e9e5de9f20f24f1a45733e5e187ee8c22b9529ad61c8286d7b7763a0381dc44b5de6cc56871c144a4766774216783836794e7926036

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsg:BbdDmjr+OtEvwDpjM8I

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • UPX dump on OEP (original entry point) 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-07_d662f14c994f642d32d55fab8cbdfb27_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-07_d662f14c994f642d32d55fab8cbdfb27_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2964
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2708

Network

  • flag-us
    DNS
    emrlogistics.com
    asih.exe
    Remote address:
    8.8.8.8:53
    Request
    emrlogistics.com
    IN A
    Response
    emrlogistics.com
    IN CNAME
    traff-6.hugedomains.com
    traff-6.hugedomains.com
    IN CNAME
    hdr-nlb10-d66bbad0736f8259.elb.us-east-2.amazonaws.com
    hdr-nlb10-d66bbad0736f8259.elb.us-east-2.amazonaws.com
    IN A
    3.140.13.188
    hdr-nlb10-d66bbad0736f8259.elb.us-east-2.amazonaws.com
    IN A
    18.119.154.66
  • flag-us
    DNS
    emrlogistics.com
    asih.exe
    Remote address:
    8.8.8.8:53
    Request
    emrlogistics.com
    IN A
  • 3.140.13.188:443
    emrlogistics.com
    asih.exe
    152 B
    3
  • 18.119.154.66:443
    emrlogistics.com
    asih.exe
    152 B
    3
  • 3.140.13.188:443
    emrlogistics.com
    asih.exe
    152 B
    3
  • 18.119.154.66:443
    emrlogistics.com
    asih.exe
    152 B
    3
  • 3.140.13.188:443
    emrlogistics.com
    asih.exe
    152 B
    3
  • 18.119.154.66:443
    emrlogistics.com
    asih.exe
    152 B
    3
  • 3.140.13.188:443
    emrlogistics.com
    asih.exe
    152 B
    3
  • 18.119.154.66:443
    emrlogistics.com
    asih.exe
    52 B
    1
  • 8.8.8.8:53
    emrlogistics.com
    dns
    asih.exe
    124 B
    193 B
    2
    1

    DNS Request

    emrlogistics.com

    DNS Request

    emrlogistics.com

    DNS Response

    3.140.13.188
    18.119.154.66

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    63KB

    MD5

    d1f26fade38113ecdb568fe58cd2f49b

    SHA1

    6d474ea8a16428a5462a42636881e618671e4c36

    SHA256

    27126cd0b267f819602f10bf46989709951786bfb27bca4cedce5114947e2558

    SHA512

    aeedbe7d90858e293c70184a25f08f6d416fdce283bdc93bc0bf91a89880bd2553f2156024d631cb88b9ba14bc4f66261020c36aa4b5db3c02b72f9ac5747048

  • memory/2708-17-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2708-25-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2964-1-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2964-0-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2964-2-0x0000000000300000-0x0000000000306000-memory.dmp

    Filesize

    24KB

  • memory/2964-6-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2964-14-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.