Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09/03/2024, 03:42 UTC

General

  • Target

    2024-03-09_e5346d09b3c0653cfc46fac9fdcd29a2_cryptolocker.exe

  • Size

    41KB

  • MD5

    e5346d09b3c0653cfc46fac9fdcd29a2

  • SHA1

    81fa4d54978693a43f37dbbaceb50098f6551e90

  • SHA256

    7f3fb73cc7c78bd7c654c173b31f99fef1e2c41fde0204a5bd8a327f215d4606

  • SHA512

    400cf39fa2f0d31bb4791a287f9dd4932cf675e253fe454676a53e12b27c686b5686809c373acd63f2a742d2eb90d0dd3276281e1f4b1fe890884a9cd1317ebf

  • SSDEEP

    768:bgX4zYcgTEu6QOaryfjqDDw3sCu529hyr:bgGYcA/53GADw8Ch9s

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-09_e5346d09b3c0653cfc46fac9fdcd29a2_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-09_e5346d09b3c0653cfc46fac9fdcd29a2_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2200
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2340

Network

  • flag-us
    DNS
    mytarta.com
    hasfj.exe
    Remote address:
    8.8.8.8:53
    Request
    mytarta.com
    IN A
    Response
No results found
  • 8.8.8.8:53
    mytarta.com
    dns
    hasfj.exe
    57 B
    107 B
    1
    1

    DNS Request

    mytarta.com

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    41KB

    MD5

    5056e0be92e17bded1c258326a80424f

    SHA1

    f8c199e1344618546bd5f7a46aef05693944826f

    SHA256

    1554e09df3503787fa08a9f07e0010b82e3bf41153326432dc29cabeb571b633

    SHA512

    86bfe71eda806191f67a4d1c5f691337b26bffd8e5327920730fed627c96bf48ff5a64213fdc62288ae68613685f0ffa3fb7672be15e23a87eff54fd4f3b5add

  • memory/2200-0-0x00000000002F0000-0x00000000002F6000-memory.dmp

    Filesize

    24KB

  • memory/2200-2-0x00000000002F0000-0x00000000002F6000-memory.dmp

    Filesize

    24KB

  • memory/2200-1-0x0000000001CE0000-0x0000000001CE6000-memory.dmp

    Filesize

    24KB

  • memory/2340-15-0x0000000000490000-0x0000000000496000-memory.dmp

    Filesize

    24KB

  • memory/2340-22-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.