Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    164s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2024, 06:51

General

  • Target

    2024-03-28_bc1e51d94a46c4c2d8213e3cfc71715c_cryptolocker.exe

  • Size

    40KB

  • MD5

    bc1e51d94a46c4c2d8213e3cfc71715c

  • SHA1

    54e2874e8ae2d3ae26895ee114b16b1d454d469c

  • SHA256

    cf30333972a124401bfbdb32ddb19dfc20668b9292c2ff9250b12871a2d1155c

  • SHA512

    8f36ee4dc3189f40f9f99a3db742b53c30e3c5dc2c9a491c6f84b6658022ec1020ad5788db7899a6c95fbb32ad2106f0611b5bdc50158aed7caff11715fa6ee3

  • SSDEEP

    768:bCDOw9UiaKHfjnD0S16avdrQFiLjJvtAI:bCDOw9aMDooc+vAI

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-28_bc1e51d94a46c4c2d8213e3cfc71715c_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-28_bc1e51d94a46c4c2d8213e3cfc71715c_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      PID:1216

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\lossy.exe

    Filesize

    40KB

    MD5

    cc71c3d889bb742e51d62dcccb3680cc

    SHA1

    36be79fda7d2c0ffded428cf6ddb6db8b12b1547

    SHA256

    785db2d5c59fb475c88ace227613f8d5c9d02c629a557987235684767fc7c0c7

    SHA512

    1f293baef3f400a41e55fe3e85d0f2faa56745b08b5fb6388dcf63c2593e67956af9dfa55f6bdd654ee8d1cb0bb87a66f65cfd034af86f07c4a7b3ccc26f3b45

  • memory/1216-17-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/1216-18-0x0000000000330000-0x0000000000336000-memory.dmp

    Filesize

    24KB

  • memory/1216-25-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/2228-0-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/2228-1-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2228-2-0x0000000000270000-0x0000000000276000-memory.dmp

    Filesize

    24KB

  • memory/2228-9-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2228-15-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB