Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    11s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    16/05/2024, 22:30

General

  • Target

    2024-05-16_ed4be8e3296baf5aaac53b5aab448926_cryptolocker.exe

  • Size

    39KB

  • MD5

    ed4be8e3296baf5aaac53b5aab448926

  • SHA1

    880fc05736e96f6bee84be064efb631f2aa94eb9

  • SHA256

    36499009f2c9940f7d63aa67d2968ac45045b9b0b3a50372e99f181d8a8d75a1

  • SHA512

    ec027bdb5dc114db327fc355e0c1205b8da9792fef0a04f3e2924b907445bb0191625c5f842a9ec2da19fd8520daba14445cdca79652fcd69d618be46fe7fd43

  • SSDEEP

    384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSzn1KkZCb9q8IujdxNYLbL5m:b/yC4GyNM01GuQMNXw2PSj1Pqq8BYtm

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-16_ed4be8e3296baf5aaac53b5aab448926_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-16_ed4be8e3296baf5aaac53b5aab448926_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1368
    • C:\Users\Admin\AppData\Local\Temp\retln.exe
      "C:\Users\Admin\AppData\Local\Temp\retln.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\retln.exe

    Filesize

    39KB

    MD5

    d39d349091e6bb61f4464e58ff2f1956

    SHA1

    7616803c016b5f998dc2ce07ec4c1eaa78dadc14

    SHA256

    84ab500b1af26421732b6efb82f6d34f8b8fa35eda9e71cfc00ce9fc69a0f183

    SHA512

    00dfb752d7bb22575e57bc77873a0df55ddd16f9e4e38745b3ca1d7acfb72bbd21156d1cfeaf52f53c9e4d44539981eff03f46a7464269b553db7e86accd22e7

  • memory/1368-0-0x00000000003E0000-0x00000000003E6000-memory.dmp

    Filesize

    24KB

  • memory/1368-8-0x00000000003E0000-0x00000000003E6000-memory.dmp

    Filesize

    24KB

  • memory/1368-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2324-23-0x0000000000210000-0x0000000000216000-memory.dmp

    Filesize

    24KB