Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    28/04/2024, 19:34

General

  • Target

    2024-04-28_d4037b18f337c126657185b132f63680_cryptolocker.exe

  • Size

    85KB

  • MD5

    d4037b18f337c126657185b132f63680

  • SHA1

    8b06f35aced3557091dde141b5d1d9e6419581e0

  • SHA256

    37575dffb811232e9cbad949dff96a601f1e191e1f6c40f563ef4a741aca6103

  • SHA512

    9cfa5dfa8e79b79480a86251ba482eefd1817d2412b111f93239240600b64d4f53aaa91cb372c1744769b116725b984100f158711345cedcd87f998670738ab6

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjyaLccVNl6aO:V6a+pOtEvwDpjvpi

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-28_d4037b18f337c126657185b132f63680_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-28_d4037b18f337c126657185b132f63680_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2556

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    85KB

    MD5

    6c9127c0f34b10f7b14a67f72b49bef0

    SHA1

    5c4fe5e5ddf7536ca24f1fcf802b83e76429a9b6

    SHA256

    7f16a2011e5a44041a3b01469a4f9edb950f4ba3dcb1c857e2437a342b896789

    SHA512

    497301bb725cb15c6445e727360fe02d22c5f31eb9eeebb569961f2805b64f688a5d6eeb67284291f57709a829de280cbe753b392cdc527c889014d752428e66

  • memory/2556-15-0x0000000000300000-0x0000000000306000-memory.dmp

    Filesize

    24KB

  • memory/2556-22-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/3012-0-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/3012-1-0x00000000004A0000-0x00000000004A6000-memory.dmp

    Filesize

    24KB

  • memory/3012-8-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB