Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    14/05/2024, 04:40

General

  • Target

    2024-05-14_abe5a170176874c5ab7dfcc204d87a36_cryptolocker.exe

  • Size

    30KB

  • MD5

    abe5a170176874c5ab7dfcc204d87a36

  • SHA1

    594672d8e43f0626c6a02e7d5045b81f72dd83a0

  • SHA256

    0e7ca921e13c5c3895f122d811be5528d8598d5cd144e18c557ad3c648dc85fc

  • SHA512

    619141a9b5eacea9faf09c5dd29c5cec2163869b57fc93921f7d4a87dc2784760eb51c86406703f6e557ad9765b66aac664dece03515df0a39b692e212c0b71e

  • SSDEEP

    768:Kf1K2exg2kBwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZsBGGbNAKSjNf2K:o1KhxqwtdgI2MyzNORQtOflIwoHNV2Xo

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-14_abe5a170176874c5ab7dfcc204d87a36_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-14_abe5a170176874c5ab7dfcc204d87a36_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2312
    • C:\Users\Admin\AppData\Local\Temp\hurok.exe
      "C:\Users\Admin\AppData\Local\Temp\hurok.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hurok.exe

    Filesize

    30KB

    MD5

    907bfbe59f244a9363486aa78d6bca43

    SHA1

    2e4852cf35c55d570141e7ef64a00e5b76d0ac1b

    SHA256

    5b7fb5c65889746dd86a6a2418535dd2c5f7cb2d2acabc92357a62eff2c01ddb

    SHA512

    7b0cd4b94eeee2e1590bfec9e4bbe73156a3400d7741558a7ef37355d11ab6e1c4d8e0c2b53c7299ef7ee7a15ed34cc49ee30b61d05fb3f9322cea73b50c9abe

  • memory/2312-0-0x00000000002F0000-0x00000000002F6000-memory.dmp

    Filesize

    24KB

  • memory/2312-7-0x00000000002F0000-0x00000000002F6000-memory.dmp

    Filesize

    24KB

  • memory/2312-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2548-23-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB