Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    19s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23/04/2024, 07:29

General

  • Target

    2024-04-23_34ef8733b236b06e8de4b2ff8c08d7ca_cryptolocker.exe

  • Size

    32KB

  • MD5

    34ef8733b236b06e8de4b2ff8c08d7ca

  • SHA1

    59146cb3de71158f80366e523bc12e2e7ea5396d

  • SHA256

    613e0e7335f697c0b7c910e1fdc4cd436104c2bfa5d7d75fa225e0cc5758bf3e

  • SHA512

    87cc5d98c33a595e042a446c70ea92be482730b86f642f796168c83844b9c0af45e2aff2fae82f3a83cf2c4ce6e8ded3928d2c1f2b790adbdf908a981075babd

  • SSDEEP

    384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSznStEkcs8v:b/yC4GyNM01GuQMNXw2PSjSKkc9v

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-23_34ef8733b236b06e8de4b2ff8c08d7ca_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-23_34ef8733b236b06e8de4b2ff8c08d7ca_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Users\Admin\AppData\Local\Temp\retln.exe
      "C:\Users\Admin\AppData\Local\Temp\retln.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2240

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\retln.exe

    Filesize

    32KB

    MD5

    5bce7348225570bc54d840d9c89253a4

    SHA1

    86fec397c7133aa776a56d71830432b1a8dca5bf

    SHA256

    fa3b79d660840e32d17570a834044da71242fb63b787cc434b0e8b3dab98d71e

    SHA512

    9a8503a7c602eac596331062189f2f41c9b73bfbc1335e6ab76467a2c5e143c4df22107084fe709d3ccafd50634fd68b29a24d57fe54facf89095b8f2e34820d

  • memory/1640-0-0x00000000003C0000-0x00000000003C6000-memory.dmp

    Filesize

    24KB

  • memory/1640-2-0x00000000003C0000-0x00000000003C6000-memory.dmp

    Filesize

    24KB

  • memory/1640-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2240-17-0x0000000000320000-0x0000000000326000-memory.dmp

    Filesize

    24KB