Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    18/04/2024, 07:32

General

  • Target

    2024-04-18_35276060ce475af2bc07e610a3bdbf76_cryptolocker.exe

  • Size

    81KB

  • MD5

    35276060ce475af2bc07e610a3bdbf76

  • SHA1

    e5beadb85541d8e08c06b01a774b41bfc7371cc7

  • SHA256

    49cf115e70704f9ef196d8cefe0abdbf5a8cccdca67f94dea8e8248dc3a956bd

  • SHA512

    b48a24fe54542408d6aaba4f9e9ce8d96678683ae4872b52f291b994fe6dd56e3ac490b5a5b13552216fbe07c015b9c7e8769ab633af350aee72a9ffce51f135

  • SSDEEP

    1536:vj+jsMQMOtEvwDpj5HwYYTjipvF2hBfWafHNqV5:vCjsIOtEvwDpj5H9YvQd2m

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-18_35276060ce475af2bc07e610a3bdbf76_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-18_35276060ce475af2bc07e610a3bdbf76_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2724
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:1616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    81KB

    MD5

    43bc0e636fa03e0d0d3542460aef68c4

    SHA1

    7c958a55378021843f0a4d20b75c92e5da06f947

    SHA256

    b751b395739abb7353c8325161a35e65e12e6dcbbc0a4d20d32ffedf46500f5e

    SHA512

    b468ff2d2642e896908c9e3b28f6e44eb62245ef5a73912d5d83ae960734ce5702f10495c8a795e8a78f4d82348a0818fd045bb2694cefc2f44716891eb40cb7

  • memory/1616-22-0x0000000000330000-0x0000000000336000-memory.dmp

    Filesize

    24KB

  • memory/1616-15-0x0000000000360000-0x0000000000366000-memory.dmp

    Filesize

    24KB

  • memory/2724-8-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2724-1-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/2724-0-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB