Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    15/03/2024, 21:26 UTC

General

  • Target

    2024-03-15_1d95ff217eae1a2c19800ce4b1121e51_cryptolocker.exe

  • Size

    89KB

  • MD5

    1d95ff217eae1a2c19800ce4b1121e51

  • SHA1

    453b92402f79a06399eb4936341f95fb03951197

  • SHA256

    47d5686c75824615f5e91a6dc2948deadd38595a71a7bc0a58d584a409a6a633

  • SHA512

    c13f151da0f338c90bff01a9a5c3baf5b0127406c4a9820b28bbbc3a7facaae5833db295bdebd0e8a97f0475b108d85449c992ac312acfe5c8567262f3a6ad4d

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjQGYQbN/PKwMgq:V6a+pOtEvwDpjtz2

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-15_1d95ff217eae1a2c19800ce4b1121e51_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-15_1d95ff217eae1a2c19800ce4b1121e51_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2352
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2272

Network

  • flag-us
    DNS
    emrlogistics.com
    asih.exe
    Remote address:
    8.8.8.8:53
    Request
    emrlogistics.com
    IN A
    Response
    emrlogistics.com
    IN CNAME
    traff-3.hugedomains.com
    traff-3.hugedomains.com
    IN CNAME
    hdr-nlb4-0bbd2e21834cb637.elb.us-east-2.amazonaws.com
    hdr-nlb4-0bbd2e21834cb637.elb.us-east-2.amazonaws.com
    IN A
    3.19.116.195
    hdr-nlb4-0bbd2e21834cb637.elb.us-east-2.amazonaws.com
    IN A
    3.18.7.81
  • 3.19.116.195:443
    emrlogistics.com
    asih.exe
    152 B
    3
  • 3.18.7.81:443
    emrlogistics.com
    asih.exe
    152 B
    3
  • 3.19.116.195:443
    emrlogistics.com
    asih.exe
    152 B
    3
  • 3.18.7.81:443
    emrlogistics.com
    asih.exe
    152 B
    3
  • 3.19.116.195:443
    emrlogistics.com
    asih.exe
    152 B
    3
  • 3.18.7.81:443
    emrlogistics.com
    asih.exe
    152 B
    3
  • 3.19.116.195:443
    emrlogistics.com
    asih.exe
    152 B
    3
  • 3.18.7.81:443
    emrlogistics.com
    asih.exe
    52 B
    1
  • 8.8.8.8:53
    emrlogistics.com
    dns
    asih.exe
    62 B
    192 B
    1
    1

    DNS Request

    emrlogistics.com

    DNS Response

    3.19.116.195
    3.18.7.81

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    89KB

    MD5

    c97e76d9d6d9e1460b2f3cc5343cb23a

    SHA1

    636811da5611bed1ddc32e65ff7d2a0fccb77ef4

    SHA256

    5337c93bd623abb271331b0687c4169e009e18f51f0365e6bda4d1036a130e93

    SHA512

    7901a545660227d02447014540fd2e3c9e00ed391a5bcc78f6b4f072a059dc1d0c74db29df6dedbb62b9049457060ce0a7d6b0709a1e5b1482b76e4a9e6e1c12

  • memory/2272-15-0x0000000000370000-0x0000000000376000-memory.dmp

    Filesize

    24KB

  • memory/2272-18-0x0000000000330000-0x0000000000336000-memory.dmp

    Filesize

    24KB

  • memory/2352-0-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2352-1-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB

  • memory/2352-8-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.