Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    04/05/2024, 19:33

General

  • Target

    2024-05-04_6526e70e4962e7975fc6c5a3888e2b1e_cryptolocker.exe

  • Size

    79KB

  • MD5

    6526e70e4962e7975fc6c5a3888e2b1e

  • SHA1

    1d1dffa0732a41f4754a9b59151379602e4ed993

  • SHA256

    50918409db0209b52a30fcab31cb566d73c772d84fe581212a6e1071f700690e

  • SHA512

    0462744a0b694dc271fd1fe57abf480a76e112bbd4971dec3e3f46b16702f10683fda16201f8c84149e665e90d90772a838c1a3ae57f91b14c9fa9f4cfcd90c2

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjyaLccVNlupU:V6a+pOtEvwDpjvpN

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-04_6526e70e4962e7975fc6c5a3888e2b1e_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-04_6526e70e4962e7975fc6c5a3888e2b1e_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2952
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    79KB

    MD5

    632c4d8cce7db74d8d524aa021a3dd50

    SHA1

    25cb99c645a21d29015709179185c079142360fa

    SHA256

    7c12419728486765e982e6f682d57e9047b12e00c18bcb6bd7385b7e1f30994c

    SHA512

    ce2ab2c6abc44ef4084bc880a6e90b52ad5b0b7175563ed39de34eef9f346258dbfdde11be8d5872bd242899855840704829288840b0fdd9c304692adda1dc23

  • memory/2616-15-0x0000000000480000-0x0000000000486000-memory.dmp

    Filesize

    24KB

  • memory/2616-22-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2952-0-0x0000000000300000-0x0000000000306000-memory.dmp

    Filesize

    24KB

  • memory/2952-1-0x00000000004A0000-0x00000000004A6000-memory.dmp

    Filesize

    24KB

  • memory/2952-8-0x0000000000300000-0x0000000000306000-memory.dmp

    Filesize

    24KB