Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    15/04/2024, 19:47

General

  • Target

    2024-04-15_83c3245bdb2cf3de03175ce1e8464cfc_cryptolocker.exe

  • Size

    389KB

  • MD5

    83c3245bdb2cf3de03175ce1e8464cfc

  • SHA1

    6ec4d19c27dcd1b78ed05bc89d4fbe88563ea79c

  • SHA256

    22ce1309330d4969a5b4383908f7673278b5f2605470c6bf1d9fd92661bb7ec6

  • SHA512

    2bdf2ca27ef5016f4f13b34108c17c4bc3b56e5daa0928fa88e698a190eb664bff2f23b55e937243ec0439e6b51dcadbfc77da31f74b8cde26c8af15534ba1cf

  • SSDEEP

    6144:nnOsaQgAOjvrZFODJjBz3j1jTqQy6v2GGnugOtihzXO:nnOflT/ZFIjBz3xjTxynGUOUhXO

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-15_83c3245bdb2cf3de03175ce1e8464cfc_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-15_83c3245bdb2cf3de03175ce1e8464cfc_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      PID:2516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    389KB

    MD5

    95fe0d5e00fc10f04c9a9510ce26d9f8

    SHA1

    73cb05123adf9b6774c6f49dfc188d7226cdddbe

    SHA256

    f76e3fa43753cd62ed7e2e35145b11c64e15fa5372fa0aa32a650eb47ab59cc3

    SHA512

    1cf22c46b7b41345033d1d70115579bcc3e3485875d673a514e5e99af81a85c9a9495e055f7c39cfd7e781026c480f00217b73f4aafb345c462c77ec8f1ab85c

  • memory/1600-0-0x0000000001CA0000-0x0000000001CA6000-memory.dmp

    Filesize

    24KB

  • memory/1600-1-0x0000000001CA0000-0x0000000001CA6000-memory.dmp

    Filesize

    24KB

  • memory/1600-2-0x0000000001CB0000-0x0000000001CB6000-memory.dmp

    Filesize

    24KB

  • memory/2516-15-0x0000000000480000-0x0000000000486000-memory.dmp

    Filesize

    24KB

  • memory/2516-22-0x0000000000470000-0x0000000000476000-memory.dmp

    Filesize

    24KB