Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    12/05/2024, 14:46

General

  • Target

    2024-05-12_d4c6d5c5825ee20a1173ffc99272e0d5_cryptolocker.exe

  • Size

    73KB

  • MD5

    d4c6d5c5825ee20a1173ffc99272e0d5

  • SHA1

    55df809ab9f73f333da975d278df6de627d11231

  • SHA256

    ad69cd37ddff507f08082a1cbf982c4a1c34e226505bd3bc1599c2c18e326993

  • SHA512

    d0a1e3db6a79d01ab78a5d43e4e4e52379578a76aa5bb4e84356afd0d41e155ffe1498efa1c8d21a977967356ef101d455085703c099bfa458f3495fb9046186

  • SSDEEP

    768:u6LsoEEeegiZPvEhHSG+gZgtOOtEvwDpjeY10Y/YMss:u6QFElP6n+gWMOtEvwDpjJGYQbs

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-12_d4c6d5c5825ee20a1173ffc99272e0d5_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-12_d4c6d5c5825ee20a1173ffc99272e0d5_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    73KB

    MD5

    952173ba5badaaaf6592fbb0ee50ec0f

    SHA1

    84903d9b9d507ae0d002b96d8264c944d9414875

    SHA256

    1832ed9b81ec84bb6bf9d023899061c6ee13cd6b51d5261e90541c0f59c04add

    SHA512

    fa6e917e08b71d0be2d4da045b331e77a91506f6bd4788faa807a9b3d4217ead07ed3e3a571a5aa00bfe07308719016d8808768bae06ff2ef2cc21576fe1c06d

  • memory/2392-0-0x00000000002B0000-0x00000000002B6000-memory.dmp

    Filesize

    24KB

  • memory/2392-1-0x0000000000300000-0x0000000000306000-memory.dmp

    Filesize

    24KB

  • memory/2392-8-0x00000000002B0000-0x00000000002B6000-memory.dmp

    Filesize

    24KB

  • memory/2756-15-0x0000000000380000-0x0000000000386000-memory.dmp

    Filesize

    24KB

  • memory/2756-22-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB