Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25/03/2024, 20:40

General

  • Target

    2024-03-25_a7656e968071489e7327ae8790283473_cryptolocker.exe

  • Size

    43KB

  • MD5

    a7656e968071489e7327ae8790283473

  • SHA1

    15400a0a729d81b322cdeeda2835c9952471637d

  • SHA256

    aa4de9e49cd5e596ed071645870bb3a516c60e33662c7e479d23a1227e3ce6b2

  • SHA512

    fcb89885f5755c45a57c8e4da0007d2b46a14734ad7cce9aa73c456990ecd535d9b1e0f3c356e4426555630d13e4e0606f9d2e372edeee22ce89ac78faa92888

  • SSDEEP

    768:bgX4zYcgTEu6QOaryfjqDDw3sCu5b+syQNAx:bgGYcA/53GADw8Cl/nx

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-25_a7656e968071489e7327ae8790283473_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-25_a7656e968071489e7327ae8790283473_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    44KB

    MD5

    ec467903915589a74d6b39d5860728b3

    SHA1

    1f579403a7805ec7309f70a1c2c3d59123a49f09

    SHA256

    46a63c445b2e2cc609c998647b4b5e9dc7a89ac4156e39fe1aa3c86ebb371636

    SHA512

    ac5b7a4135eb8c4696abcff4861c513fab6e1f0878fb2625c488023ee131b82985ed527e69fb7cc244af600a0bdf8a186b1bfe191aeccaefff58b098f4506233

  • memory/1736-0-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/1736-1-0x0000000000500000-0x0000000000506000-memory.dmp

    Filesize

    24KB

  • memory/1736-8-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/2548-15-0x00000000002E0000-0x00000000002E6000-memory.dmp

    Filesize

    24KB

  • memory/2548-22-0x00000000002D0000-0x00000000002D6000-memory.dmp

    Filesize

    24KB