Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26/03/2024, 05:34 UTC

General

  • Target

    2024-03-26_4d1fecfeca4560d0787990d213a5b9f8_cryptolocker.exe

  • Size

    33KB

  • MD5

    4d1fecfeca4560d0787990d213a5b9f8

  • SHA1

    49e572d61e9a26a57113db6e8b5b11902c2983ef

  • SHA256

    4a1cb0a2d6908293a60a37caf0f0e55bd85775d52d0447a7d8c593d83798c81a

  • SHA512

    7c68316b07de113fa5a73090e9f1ed02388471053dc6bbba899e86ccc911d312fe0d75a5214931bdd50591ecf642c53b8aaaa34ce82f19ceaa248bdb15869d1f

  • SSDEEP

    384:bAvMaNGh4z7CG3POOvbRSLoF/F0QU5XYFnufc/zzo6ckJp0qAgmEzXKxA+T63:bAvJCYOOvbRPDEgXRc+BAILiy

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-26_4d1fecfeca4560d0787990d213a5b9f8_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-26_4d1fecfeca4560d0787990d213a5b9f8_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2216
    • C:\Users\Admin\AppData\Local\Temp\demka.exe
      "C:\Users\Admin\AppData\Local\Temp\demka.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:1356

Network

  • flag-us
    DNS
    ttms.org
    demka.exe
    Remote address:
    8.8.8.8:53
    Request
    ttms.org
    IN A
    Response
    ttms.org
    IN A
    35.215.114.222
  • flag-us
    GET
    https://ttms.org/config/UKo8.exe
    demka.exe
    Remote address:
    35.215.114.222:443
    Request
    GET /config/UKo8.exe HTTP/1.1
    Accept: text/*, application/*
    User-Agent: Updates downloader
    Host: ttms.org
    Cache-Control: no-cache
    Response
    HTTP/1.1 404 Not Found
    Server: nginx
    Date: Tue, 26 Mar 2024 05:34:15 GMT
    Content-Type: text/html
    Transfer-Encoding: chunked
    Connection: keep-alive
    Vary: Accept-Encoding
    X-Httpd: 1
    Host-Header: 8441280b0c35cbc1147f8ba998a563a7
    X-Proxy-Cache: HIT
  • flag-us
    DNS
    apps.identrust.com
    demka.exe
    Remote address:
    8.8.8.8:53
    Request
    apps.identrust.com
    IN A
    Response
    apps.identrust.com
    IN CNAME
    identrust.edgesuite.net
    identrust.edgesuite.net
    IN CNAME
    a1952.dscq.akamai.net
    a1952.dscq.akamai.net
    IN A
    96.17.179.205
    a1952.dscq.akamai.net
    IN A
    96.17.179.184
  • flag-gb
    GET
    http://apps.identrust.com/roots/dstrootcax3.p7c
    demka.exe
    Remote address:
    96.17.179.205:80
    Request
    GET /roots/dstrootcax3.p7c HTTP/1.1
    Connection: Keep-Alive
    Accept: */*
    User-Agent: Microsoft-CryptoAPI/6.1
    Host: apps.identrust.com
    Response
    HTTP/1.1 200 OK
    X-XSS-Protection: 1; mode=block
    X-Frame-Options: SAMEORIGIN
    X-Content-Type-Options: nosniff
    X-Robots-Tag: noindex
    Referrer-Policy: same-origin
    Last-Modified: Fri, 13 Oct 2023 16:28:31 GMT
    ETag: "37d-6079b8c0929c0"
    Accept-Ranges: bytes
    Content-Length: 893
    X-Content-Type-Options: nosniff
    X-Frame-Options: sameorigin
    Content-Type: application/pkcs7-mime
    Cache-Control: max-age=3600
    Expires: Tue, 26 Mar 2024 06:34:12 GMT
    Date: Tue, 26 Mar 2024 05:34:12 GMT
    Connection: keep-alive
  • 35.215.114.222:443
    https://ttms.org/config/UKo8.exe
    tls, http
    demka.exe
    2.4kB
    92.4kB
    41
    71

    HTTP Request

    GET https://ttms.org/config/UKo8.exe

    HTTP Response

    404
  • 96.17.179.205:80
    http://apps.identrust.com/roots/dstrootcax3.p7c
    http
    demka.exe
    421 B
    1.6kB
    6
    5

    HTTP Request

    GET http://apps.identrust.com/roots/dstrootcax3.p7c

    HTTP Response

    200
  • 8.8.8.8:53
    ttms.org
    dns
    demka.exe
    54 B
    70 B
    1
    1

    DNS Request

    ttms.org

    DNS Response

    35.215.114.222

  • 8.8.8.8:53
    apps.identrust.com
    dns
    demka.exe
    64 B
    165 B
    1
    1

    DNS Request

    apps.identrust.com

    DNS Response

    96.17.179.205
    96.17.179.184

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fadc25f3c624dc7391afe4b1cad35480

    SHA1

    c8e7b657ed092da7dab8f877804994929907642b

    SHA256

    71e948058522515e169078fe674ec4a95ded9991b7e564500999f896c881d755

    SHA512

    7fcc289ca5be1149f1024e171263b561748ad1defc76d13a4f4cb46fb43b5b91e0cb4979f301901d9a896943a825ff27fa5f2ed2a40fbfe00db3cde87d19e0d4

  • C:\Users\Admin\AppData\Local\Temp\Cab4A7A.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar4DEB.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

  • \Users\Admin\AppData\Local\Temp\demka.exe

    Filesize

    33KB

    MD5

    9da3d31c7d06b47de4fadfdee7aad92a

    SHA1

    41d63e7042d874c893261f860e4fd6e464dae183

    SHA256

    ea937a8524436b159a125d768c57817a65b3c3545644674f3fd59792d80a28ab

    SHA512

    0dc6d99518eac9df0ead5def844fcb9ef4ee993386858b8721e5b9c52d73aae687422931141e4c5bbdae6fd4bcb7d1d3a767b4e0d4fa7c758279220bfdeb27bc

  • memory/1356-19-0x0000000000260000-0x0000000000266000-memory.dmp

    Filesize

    24KB

  • memory/2216-0-0x00000000002E0000-0x00000000002E6000-memory.dmp

    Filesize

    24KB

  • memory/2216-2-0x00000000002E0000-0x00000000002E6000-memory.dmp

    Filesize

    24KB

  • memory/2216-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.