Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    132s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13/03/2024, 16:31

General

  • Target

    2024-03-13_336016ac6f9475937ec7e1bc115fa76d_cryptolocker.exe

  • Size

    72KB

  • MD5

    336016ac6f9475937ec7e1bc115fa76d

  • SHA1

    fbf3d0f4ae3efae4b36ad9cd823a09bb8c3b3a19

  • SHA256

    a29c2d88121aba18c33e62de1a1d37da55cb0b86e8f72f95d3fcb378bca34fbc

  • SHA512

    bc2ec5933e4899ce89573a1ce8c8cd05c008dedf4d9c39402f3264bc2e7f98390728587feecf6d3a28d8cd8685b73b156c9eb5f1a87bd5d60d6558300e7c0e0f

  • SSDEEP

    1536:X6QFElP6n+gJQMOtEvwDpjBZYTjipvF2bx1rHsd:X6a+SOtEvwDpjBZYvQd2+

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-13_336016ac6f9475937ec7e1bc115fa76d_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-13_336016ac6f9475937ec7e1bc115fa76d_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    72KB

    MD5

    ac6ec49dc0d900c199cec75d10db2aa3

    SHA1

    f202866bb3473a615d098526a79dcff44a12436f

    SHA256

    a5b6e628e85c555f636609f3fb01fc1e53b08fde890f27ad5ede7a4c28489564

    SHA512

    794dd6a5860712a835a277d362ca1360ebe25e20837ccf038f7dd00e7908b966cd1f2b91a52a49039275872cc79d20c9b1f6bd8856c0699b231cb883536388c7

  • memory/2036-0-0x00000000001C0000-0x00000000001C6000-memory.dmp

    Filesize

    24KB

  • memory/2036-1-0x0000000000270000-0x0000000000276000-memory.dmp

    Filesize

    24KB

  • memory/2036-2-0x00000000001C0000-0x00000000001C6000-memory.dmp

    Filesize

    24KB

  • memory/2596-15-0x0000000000340000-0x0000000000346000-memory.dmp

    Filesize

    24KB

  • memory/2596-20-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB