Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    30/04/2024, 19:10 UTC

General

  • Target

    2024-04-30_663fc31ea8e1fc5623b3c03817d2b232_cryptolocker.exe

  • Size

    65KB

  • MD5

    663fc31ea8e1fc5623b3c03817d2b232

  • SHA1

    ff8cae4428a4daa1fcf6a07cd5c6d670eab4b2b7

  • SHA256

    fc9e09a5107cd542f3b39ca4115403adcd6a7e57c8194d33ef83d9deb803d2c0

  • SHA512

    5de0947ceef57ef2893150fdc7c27fcb82e0e6cf12b26873bd4659d7825502792a2917eeefd7b765c8abce849d5f413ce5bdff2b4bb1c85b1ea23ff196b0f256

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYZ8xDyv:1nK6a+qdOOtEvwDpj8

Score
9/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • UPX dump on OEP (original entry point) 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-30_663fc31ea8e1fc5623b3c03817d2b232_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-30_663fc31ea8e1fc5623b3c03817d2b232_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2740

Network

  • flag-us
    DNS
    emrlogistics.com
    asih.exe
    Remote address:
    8.8.8.8:53
    Request
    emrlogistics.com
    IN A
    Response
    emrlogistics.com
    IN CNAME
    traff-6.hugedomains.com
    traff-6.hugedomains.com
    IN CNAME
    hdr-nlb10-d66bbad0736f8259.elb.us-east-2.amazonaws.com
    hdr-nlb10-d66bbad0736f8259.elb.us-east-2.amazonaws.com
    IN A
    18.119.154.66
    hdr-nlb10-d66bbad0736f8259.elb.us-east-2.amazonaws.com
    IN A
    3.140.13.188
  • 18.119.154.66:443
    emrlogistics.com
    asih.exe
    152 B
    3
  • 3.140.13.188:443
    emrlogistics.com
    asih.exe
    152 B
    3
  • 18.119.154.66:443
    emrlogistics.com
    asih.exe
    152 B
    3
  • 3.140.13.188:443
    emrlogistics.com
    asih.exe
    152 B
    3
  • 18.119.154.66:443
    emrlogistics.com
    asih.exe
    152 B
    3
  • 3.140.13.188:443
    emrlogistics.com
    asih.exe
    152 B
    3
  • 18.119.154.66:443
    emrlogistics.com
    asih.exe
    152 B
    3
  • 3.140.13.188:443
    emrlogistics.com
    asih.exe
    52 B
    1
  • 8.8.8.8:53
    emrlogistics.com
    dns
    asih.exe
    62 B
    193 B
    1
    1

    DNS Request

    emrlogistics.com

    DNS Response

    18.119.154.66
    3.140.13.188

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    65KB

    MD5

    cdc86287e67f7be3c4db3a4618fb7e2a

    SHA1

    01e8570cd10a955cc217c7ecbee3892125985772

    SHA256

    2a01e45ceb4ba3bd26db3e25dcd92feb29b793b64faad0bb4cda401577fc7546

    SHA512

    15aebf82c91ffcc2d53d4ed736355b812f2f30ec13c1c662c024d43204d4cb6308060dc2491d895d212601417ce71ebf95f9c9e5d88a01035096c1df9e5581bc

  • memory/2120-0-0x0000000000500000-0x000000000050F311-memory.dmp

    Filesize

    60KB

  • memory/2120-2-0x0000000000470000-0x0000000000476000-memory.dmp

    Filesize

    24KB

  • memory/2120-1-0x0000000000420000-0x0000000000426000-memory.dmp

    Filesize

    24KB

  • memory/2120-9-0x0000000000420000-0x0000000000426000-memory.dmp

    Filesize

    24KB

  • memory/2120-16-0x0000000000500000-0x000000000050F311-memory.dmp

    Filesize

    60KB

  • memory/2120-14-0x00000000005F0000-0x0000000000600000-memory.dmp

    Filesize

    64KB

  • memory/2740-18-0x0000000000300000-0x0000000000306000-memory.dmp

    Filesize

    24KB

  • memory/2740-26-0x0000000000500000-0x000000000050F311-memory.dmp

    Filesize

    60KB

  • memory/2740-25-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.