Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240319-en
  • resource tags

    arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system
  • submitted
    18/04/2024, 08:29

General

  • Target

    2024-04-18_5f79b904f3c933ba01f0942611170409_cryptolocker.exe

  • Size

    41KB

  • MD5

    5f79b904f3c933ba01f0942611170409

  • SHA1

    52ddf3b9df48fabdc01ccffd1b1b2061af895afe

  • SHA256

    ad5d88f084f6d9406706dc63843355f72f23db44c5198b1226256846a747abef

  • SHA512

    56ce8e137752166dd02257faa4fc8ab6cc208b25218a3c5388db46c02571c7e4be5cef85f9a9277662ae45d23d1c7e78f849331649e04e2384ca93fac3c0bb2c

  • SSDEEP

    768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBVaD3TP7DFHuRcU:X6QFElP6n+gJQMOtEvwDpjBmzDkWU

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-18_5f79b904f3c933ba01f0942611170409_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-18_5f79b904f3c933ba01f0942611170409_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1236
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2104

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    41KB

    MD5

    8ba74f19e2f1f64a899edd5449ec2b35

    SHA1

    3353a3526cf5ffa7f427a3c6fb74f7d7586bb69f

    SHA256

    8bd754b653bd8f8d9e9401d885b4e5f4fe6a21e98078714fb676d8a4fe62c9ee

    SHA512

    53bd074ac98cf21469b9db1db610d53983a48c60e60c5baf1f1507026d33018fb4eeb721a18452a6fd43be8ad17a2f81f48896d0d796b96bb4566593c69313ac

  • memory/1236-0-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/1236-1-0x0000000000200000-0x0000000000206000-memory.dmp

    Filesize

    24KB

  • memory/1236-7-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2104-16-0x0000000001CD0000-0x0000000001CD6000-memory.dmp

    Filesize

    24KB

  • memory/2104-15-0x00000000002D0000-0x00000000002D6000-memory.dmp

    Filesize

    24KB