Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    07/05/2024, 04:34

General

  • Target

    2024-05-07_6a35618299e4d998979dfd79e132feef_cryptolocker.exe

  • Size

    43KB

  • MD5

    6a35618299e4d998979dfd79e132feef

  • SHA1

    1b77947f1b5165c72298550091213ea779fc2924

  • SHA256

    c1e6d1c997989936afe1a8104f1b79e73754230e4a94f19d8ea3de0b491a1a4f

  • SHA512

    4441e9c7d0b9a2945a02dec36700a0d8fc671e898eeb6ba49e73c167ac6febfd4249540be08fd325c0e706a78c563a806a4d28597a59d38bc3d1e3398c5fc185

  • SSDEEP

    768:bAvJCYOOvbRPDEgXrNekd7l94i3p+kfRh:bAvJCF+RQgJeab4sB3

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-07_6a35618299e4d998979dfd79e132feef_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-07_6a35618299e4d998979dfd79e132feef_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2884
    • C:\Users\Admin\AppData\Local\Temp\demka.exe
      "C:\Users\Admin\AppData\Local\Temp\demka.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:3012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\demka.exe

    Filesize

    43KB

    MD5

    86ddb9826ed35c68c2e430c368b0b014

    SHA1

    4a36a01f0410f9e5deb857d8fcc5e42360e9e28e

    SHA256

    9a700d57aba31ad820102dc46b3ee071de1c255ae4608b6177002d06edc0b498

    SHA512

    f9b6816272c753460b42066d535f61baea5b5068fbb46c59c0a40edaa77d9eb1dc85dbb6b5698136b95ebec48387d0dcea204419d7e508a001928053b38ed270

  • memory/2884-0-0x00000000002D0000-0x00000000002D6000-memory.dmp

    Filesize

    24KB

  • memory/2884-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2884-1-0x00000000002D0000-0x00000000002D6000-memory.dmp

    Filesize

    24KB

  • memory/3012-23-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB