Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26/03/2024, 02:48

General

  • Target

    2024-03-26_8bec00d0844a59f96075e9055635419a_cryptolocker.exe

  • Size

    53KB

  • MD5

    8bec00d0844a59f96075e9055635419a

  • SHA1

    f7da5e3afd05d41de87060065b0b5f07b6f72eeb

  • SHA256

    46b5907f292a5a9c364b9b140caa3520c13ca392efc19280fc6d971879861062

  • SHA512

    9074f5f88ef9c5bd1e039517a283698d95df52fb38e5fbe6cdd36ea4084d7cc55b560fe812c358c8fa090f05cb03e029a6fe4edc4c1846efb2495ab8799df2fa

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb6ImpyU:BbdDmjr+OtEvwDpjMf

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 3 IoCs
  • UPX dump on OEP (original entry point) 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-26_8bec00d0844a59f96075e9055635419a_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-26_8bec00d0844a59f96075e9055635419a_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:868
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    53KB

    MD5

    1cfab3b2f97f4fd60176263f9ab1128d

    SHA1

    ac9add748330009702b832f206d45361104b3f75

    SHA256

    5cc5f68ae03fdc24d53a981077b79cec8255b1d432569695cc33b0cf207c910b

    SHA512

    67ed311fc65f5ab311bf8a04d3c20dc69a38a9e7c631159645393d35eb1c6503ac6f61a904e3249b29f5697ba0071d403ca7dd965ab44b4737a6b770b5c634e1

  • memory/868-0-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/868-1-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/868-2-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

  • memory/868-9-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/868-15-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/868-16-0x00000000006B0000-0x00000000006C0000-memory.dmp

    Filesize

    64KB

  • memory/868-28-0x00000000006B0000-0x00000000006C0000-memory.dmp

    Filesize

    64KB

  • memory/3032-17-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/3032-26-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB