Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10/04/2024, 19:09

General

  • Target

    2024-04-10_fe2d90fdeafa99abc27dd51a351c4d91_cryptolocker.exe

  • Size

    101KB

  • MD5

    fe2d90fdeafa99abc27dd51a351c4d91

  • SHA1

    581291910e2ab4e83b1153bea6f0d0ece2e0b1fc

  • SHA256

    bd75509af4baaf8cf48a1a705ab61dd59ddde8c1798a0b83ac41cd10409597af

  • SHA512

    715a3c229242b380316d53a7dca5d846ef50b8516103121c5dde6b02cbed5e3396a19c346fcc388ad1e5e49edf5d2133f77324fac77a908dff943360534e1ab1

  • SSDEEP

    768:xQz7yVEhs9+4uR1bytOOtEvwDpjWfbZ7uyA36S7MpxRiWNa9mktJHlv/k2yO3xp:xj+VGMOtEvwDpjubwQEIiVmkxv/u8

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 5 IoCs
  • Detects executables built or packed with MPress PE compressor 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-10_fe2d90fdeafa99abc27dd51a351c4d91_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-10_fe2d90fdeafa99abc27dd51a351c4d91_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1272
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    101KB

    MD5

    4b83bd27c240824b5754e18a702d69d2

    SHA1

    ae248470eedee5b0de2b4aec90d6ecaff27647b3

    SHA256

    8f9626c09e2f5b06b94d277438ebc3d1f1d843a5df69a187fb7ecc30cc826149

    SHA512

    dbb01e3a8db0c49d3ddd4c264d45d66fcb5934bfd70e3b281b2e6738d4fdf40804a891a0fcaf9d24c6f6906e94f0a972d53903bc1f371ec0d9317720d6c1cb47

  • memory/1272-1-0x0000000000440000-0x0000000000446000-memory.dmp

    Filesize

    24KB

  • memory/1272-0-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1272-2-0x0000000000480000-0x0000000000486000-memory.dmp

    Filesize

    24KB

  • memory/1272-4-0x0000000000440000-0x0000000000446000-memory.dmp

    Filesize

    24KB

  • memory/1272-15-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1272-16-0x00000000026C0000-0x00000000026D0000-memory.dmp

    Filesize

    64KB

  • memory/2632-17-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2632-19-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/2632-20-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2632-27-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB