Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    9s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    13/05/2024, 14:50

General

  • Target

    2024-05-13_45f65b375fc4683a5deab122b8dd5cba_cryptolocker.exe

  • Size

    37KB

  • MD5

    45f65b375fc4683a5deab122b8dd5cba

  • SHA1

    a09cba61c82c27807b0ea300cd23f9fe928e747b

  • SHA256

    0d861d58a3c940bc66be2d598f233cffc59ef2c711b68ba1b63d435a1f2cf610

  • SHA512

    6969d9e7d422fc3f5e6ebb7ac57298ae28a33d0da9fef722bb0b8fa214f1bce41a042e5bbc85fea170b6ec42bbc21d3edf80018b25f6ddacd88b5c9abdac9e53

  • SSDEEP

    384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSzn1KkZCb9q8INBjP2TwWy:b/yC4GyNM01GuQMNXw2PSj1Pqq8oBjky

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-13_45f65b375fc4683a5deab122b8dd5cba_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-13_45f65b375fc4683a5deab122b8dd5cba_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2468
    • C:\Users\Admin\AppData\Local\Temp\retln.exe
      "C:\Users\Admin\AppData\Local\Temp\retln.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:1796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\retln.exe

    Filesize

    38KB

    MD5

    d5abb17f16fffdbd0ce7ab78a2bcce1b

    SHA1

    f807c6bfd5118c83dcd97ea0beb4f78bba598673

    SHA256

    76a137454d0fc026bb43e81adda5765951ee86cec6dfe8b835f30c9681b0461a

    SHA512

    40520886a533c1e6619ee8fc1e49cf6c1967e8e17e780a29d2d6ddefa078b123eb441b385bebdf4b01c615024070deb20bf090689bb3e7b923faac4cc251ba28

  • memory/1796-23-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

  • memory/2468-0-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/2468-8-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB

  • memory/2468-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB