Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    14/03/2024, 06:45

General

  • Target

    2024-03-14_1c5497bb1aa23fc78002c58a80841557_cryptolocker.exe

  • Size

    44KB

  • MD5

    1c5497bb1aa23fc78002c58a80841557

  • SHA1

    e257e006e0030eb3485c422059b3bb6560129829

  • SHA256

    6381b428dde45f874dd3699882a3b6dbf6a1f7fc8a1acd0206a89631d6084741

  • SHA512

    f64a19394f813ce8594d44c82c1bbeb3d36285664624f0729e107c08e291fb6a05bcba0611cd811423c67c523317d8868d8b287cf2ab0089e46b119e29fbf408

  • SSDEEP

    768:btB9g/WItCSsAGjX7r3BPOMHocM4vUUOmJ+96egDc:btB9g/xtCSKfxLIcMzUw96nc

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-14_1c5497bb1aa23fc78002c58a80841557_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-14_1c5497bb1aa23fc78002c58a80841557_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2692
    • C:\Users\Admin\AppData\Local\Temp\gewos.exe
      "C:\Users\Admin\AppData\Local\Temp\gewos.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2460

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\gewos.exe

    Filesize

    44KB

    MD5

    58671f25de4c50eb2188ccd39a862a99

    SHA1

    94dabbc3ff71966970a21dd24fcf1a8436543c10

    SHA256

    9db878762874ee84411ac5cd3bbabaa141835bd976738d64b5ed5c2c3e939788

    SHA512

    0a17b538b8f1916a497801b2df48958c42b679db6d95bf64e3871e823a30be8debf47a254dcb666c9b0185d828f29cf2594dceb4cffb0010879d1c66655610ac

  • memory/2460-18-0x00000000001F0000-0x00000000001F6000-memory.dmp

    Filesize

    24KB

  • memory/2692-0-0x0000000000270000-0x0000000000276000-memory.dmp

    Filesize

    24KB

  • memory/2692-2-0x0000000000270000-0x0000000000276000-memory.dmp

    Filesize

    24KB

  • memory/2692-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB