Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    13/05/2024, 21:32

General

  • Target

    2024-05-13_9348cf024e679e7095562bebf4e829a8_cryptolocker.exe

  • Size

    96KB

  • MD5

    9348cf024e679e7095562bebf4e829a8

  • SHA1

    a83a748003a3e7f17c5464b97d1fa1d35d0c0159

  • SHA256

    106340db2b8be18918b522dc409597088c5e242fe42687a949bf3cc2c946dae1

  • SHA512

    b3a450efd0d2820d9421c6a788fae7e32cd8f30561a6d33051b680b0acce2097a06941898ad0e903c0f322d96c0ebb4c970014eee98479e48e1e1a5a638e79d1

  • SSDEEP

    1536:V6QFElP6n+gMQMOtEvwDpjQGYQbN/PKwMgm:V6a+pOtEvwDpjtzi

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-13_9348cf024e679e7095562bebf4e829a8_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-13_9348cf024e679e7095562bebf4e829a8_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:1636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    96KB

    MD5

    809a00a5d663e0dfbbc6fd7310861a2b

    SHA1

    813c4cdda07b100f1756d13a1d47279af782d4eb

    SHA256

    a050993b62bff05dc1ca444894f3dd062b0c84789055f34241aa30ebc60c25f2

    SHA512

    5533473a216ebab8751d2c6acfec13ec6ba790b9724e184a8ce9a13991faa1aa6e35246bcfc22c9bdf3567c1dc341ca879e61e7dab7392dd59a81e02a40992c3

  • memory/1636-22-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/1636-15-0x0000000000310000-0x0000000000316000-memory.dmp

    Filesize

    24KB

  • memory/1732-0-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/1732-8-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/1732-2-0x0000000000380000-0x0000000000386000-memory.dmp

    Filesize

    24KB