Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22/04/2024, 01:49 UTC

General

  • Target

    2024-04-22_517038dafc5aeda00855795c110a0c8e_cryptolocker.exe

  • Size

    60KB

  • MD5

    517038dafc5aeda00855795c110a0c8e

  • SHA1

    d5b565b7d82e463450bb1b246cd06d3e6987ad6a

  • SHA256

    349db6206369ba95eac3fc928b2da9266fc66caa6414294305127c322fdb01b6

  • SHA512

    f5be8f05a80edd22af350e18b3f05430ee757f11d69de892d7e70a990af763e18198fed36f705c894440be7fbd022cc56cd1aacf82380980887efacc61034a27

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHNMhK:1nK6a+qdOOtEvwDpja

Score
9/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 5 IoCs
  • UPX dump on OEP (original entry point) 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-22_517038dafc5aeda00855795c110a0c8e_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-22_517038dafc5aeda00855795c110a0c8e_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1812
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2600

Network

  • flag-us
    DNS
    emrlogistics.com
    asih.exe
    Remote address:
    8.8.8.8:53
    Request
    emrlogistics.com
    IN A
    Response
    emrlogistics.com
    IN CNAME
    traff-3.hugedomains.com
    traff-3.hugedomains.com
    IN CNAME
    hdr-nlb4-0bbd2e21834cb637.elb.us-east-2.amazonaws.com
    hdr-nlb4-0bbd2e21834cb637.elb.us-east-2.amazonaws.com
    IN A
    3.19.116.195
    hdr-nlb4-0bbd2e21834cb637.elb.us-east-2.amazonaws.com
    IN A
    3.18.7.81
  • 3.19.116.195:443
    emrlogistics.com
    asih.exe
    152 B
    3
  • 3.18.7.81:443
    emrlogistics.com
    asih.exe
    152 B
    3
  • 3.19.116.195:443
    emrlogistics.com
    asih.exe
    152 B
    3
  • 3.18.7.81:443
    emrlogistics.com
    asih.exe
    152 B
    3
  • 3.19.116.195:443
    emrlogistics.com
    asih.exe
    152 B
    3
  • 3.18.7.81:443
    emrlogistics.com
    asih.exe
    152 B
    3
  • 3.19.116.195:443
    emrlogistics.com
    asih.exe
    152 B
    3
  • 3.18.7.81:443
    emrlogistics.com
    asih.exe
    52 B
    1
  • 8.8.8.8:53
    emrlogistics.com
    dns
    asih.exe
    62 B
    192 B
    1
    1

    DNS Request

    emrlogistics.com

    DNS Response

    3.19.116.195
    3.18.7.81

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    61KB

    MD5

    c125eb9166be4beeef354a47f069e57e

    SHA1

    137c70ac7f68055adad0bc8a031db52d14c16498

    SHA256

    907416195d994b1c5b4e342f8e0942e9a1f8be440fa5597765c4841ffde28648

    SHA512

    a25ec7bdd8afdf480ee1d6b4a609f32a48da355d13a24ae2a7d317fff0b7cc9cd288af1678c13afc1026fd346e89d82b19d94cd58e9713d0c7feaa0f70b963f6

  • memory/1812-1-0x0000000000500000-0x000000000050F311-memory.dmp

    Filesize

    60KB

  • memory/1812-0-0x0000000000300000-0x0000000000306000-memory.dmp

    Filesize

    24KB

  • memory/1812-2-0x0000000000340000-0x0000000000346000-memory.dmp

    Filesize

    24KB

  • memory/1812-3-0x0000000000300000-0x0000000000306000-memory.dmp

    Filesize

    24KB

  • memory/1812-14-0x0000000000500000-0x000000000050F311-memory.dmp

    Filesize

    60KB

  • memory/2600-16-0x0000000000500000-0x000000000050F311-memory.dmp

    Filesize

    60KB

  • memory/2600-20-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2600-18-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB

  • memory/2600-26-0x0000000000500000-0x000000000050F311-memory.dmp

    Filesize

    60KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.