Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    30/04/2024, 04:26

General

  • Target

    2024-04-30_0d30335f8dc869f5308abf7915a2a224_cryptolocker.exe

  • Size

    67KB

  • MD5

    0d30335f8dc869f5308abf7915a2a224

  • SHA1

    218366e48b5f9a5a484d753cac1447c041867f89

  • SHA256

    c92de2f91039c83fc5108bdec3894e21463d9313bab5a25506c5014dec369ebe

  • SHA512

    c21af0bc225ff852b5044619a073d888f4dc1a6da5a1c09cdf6c107072a04a908136bdeb54b7077d257eed590f3b4e443611cbaec91a6c67d83736f13a2b3e56

  • SSDEEP

    768:XS5nQJ24LR1bytOOtEvwDpjNbZ7uyA36S7MpxRXrZSUNsYD/X:i5nkFGMOtEvwDpjNbwQEI8UZDv

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • Detects executables built or packed with MPress PE compressor 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-30_0d30335f8dc869f5308abf7915a2a224_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-30_0d30335f8dc869f5308abf7915a2a224_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:944
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:1836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    67KB

    MD5

    17bd0cbd5dcff90ad70698e997b1e503

    SHA1

    8021605a4869e63c0fc8a61ce6b25105805dd757

    SHA256

    51b037699795729b94dbd936caba57f1faf646b60885552a5fd057e6d46b39db

    SHA512

    add020246219a934bbea65c2a2b222e5a6258939e8671a9d2715488467a84c7caab41ca0135f5ac881f4186c601b90a47f454ca79a9cb8514ea869047c725638

  • memory/944-0-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/944-1-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/944-2-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/944-3-0x0000000000340000-0x0000000000346000-memory.dmp

    Filesize

    24KB

  • memory/944-16-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/1836-17-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/1836-19-0x00000000002A0000-0x00000000002A6000-memory.dmp

    Filesize

    24KB

  • memory/1836-26-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/1836-27-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB