Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01/05/2024, 08:29

General

  • Target

    2024-05-01_20fcf2cdbfa76a2ef48d43930151c33c_cryptolocker.exe

  • Size

    48KB

  • MD5

    20fcf2cdbfa76a2ef48d43930151c33c

  • SHA1

    bad9e6b2f298517d20f97309f6782b96283dbc77

  • SHA256

    d9bdb16f90d2b6596ce70a0b19b880e9b63cc0823fa594ad7f9acd69c39d6885

  • SHA512

    1ab64552be57a939ece6187b9bd123b13447fded332814a61771a2c6dc04ffedca09619535820cc2b5060e182a9e979e14830670d458f28229a1aa41015aa238

  • SSDEEP

    768:B9inqyNR/QtOOtEvwDpjBK/rJ+Nw8qnTb1AuU:B9mqyNhQMOtEvwDpjBxe8S1AZ

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 4 IoCs
  • Detection of Cryptolocker Samples 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-01_20fcf2cdbfa76a2ef48d43930151c33c_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-01_20fcf2cdbfa76a2ef48d43930151c33c_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2264

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    48KB

    MD5

    252b23872a3845eb0b66796eceff29e6

    SHA1

    5514098dba7fb2533e02e3c5a820f65585611c5a

    SHA256

    d5ea0821ef8cbb11566f6f1ff04b84bcb0e5044f7402bc86eb9bc62d92ad3fd3

    SHA512

    31a8e905829e1ef74fe789eeb00d92964d08638b380cac5db719892d8a535429a93fe0b5b587926d21e0648146e47d954bcdd18c3fd86df7aed4f119505b7f89

  • memory/1704-1-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/1704-0-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/1704-9-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/1704-2-0x0000000000270000-0x0000000000276000-memory.dmp

    Filesize

    24KB

  • memory/1704-13-0x0000000002480000-0x000000000248F000-memory.dmp

    Filesize

    60KB

  • memory/1704-16-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2264-17-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB