Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    05/05/2024, 03:34

General

  • Target

    2024-05-05_7d3267e54cf80a2c2e233f7834b91d6a_cryptolocker.exe

  • Size

    51KB

  • MD5

    7d3267e54cf80a2c2e233f7834b91d6a

  • SHA1

    6f548ec468768889865a896c592be6ad01ed20fa

  • SHA256

    78e3e2f1d2733ae0fae64561347da2ba64864ef84b5adb99382804edd942ebdc

  • SHA512

    d7edaef0312765a85f4a9f9da28d5ca89e15a7c64d61aee202e70aacdca6b34e2d4def1d3083a74bd2eb622cf6faaec3fbdc05baac9ab2237d7e316fe2d6b2de

  • SSDEEP

    768:79inqyNR/QtOOtEvwDpjBK/rJ+Nw8qnTHGf1:79mqyNhQMOtEvwDpjBxe8GGf1

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 5 IoCs
  • Detection of Cryptolocker Samples 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-05_7d3267e54cf80a2c2e233f7834b91d6a_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-05_7d3267e54cf80a2c2e233f7834b91d6a_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2484

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    51KB

    MD5

    4ef3588b810dafe162e93a4e01f5fb23

    SHA1

    a8a40ab643261ccb1db4e8d2357778e804383115

    SHA256

    96718264013f026c744fa799bd40179d02c40011f4c418883719a16a84100699

    SHA512

    a545fda7940d5a33f8c7312a10d98ae29e4265308c33b5455f7846554672b6aaa8d736cbafa7a2351afd8acea2fd4d5d2017ff49ab13ff6897608b20ee3d7065

  • memory/1724-0-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/1724-2-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB

  • memory/1724-1-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/1724-9-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/1724-13-0x00000000021E0000-0x00000000021EF000-memory.dmp

    Filesize

    60KB

  • memory/1724-16-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2484-17-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/2484-19-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB

  • memory/2484-26-0x0000000000250000-0x0000000000256000-memory.dmp

    Filesize

    24KB