Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22/05/2024, 05:14

General

  • Target

    2024052150acfb281c8fa40cfd4794a3d0926d64cryptolocker.exe

  • Size

    64KB

  • MD5

    50acfb281c8fa40cfd4794a3d0926d64

  • SHA1

    ee1c9c744831b591d76f1164b479ceabd33fcbbd

  • SHA256

    ef1008aa00ddef8aeb642996e2bfb8925374171ab6917d993d4b8fef79017fd6

  • SHA512

    cc7568c82442f0a4a0b514dae8c390b4123c9771f084b0255666bc8ab770c77cfb3054a0ff3f2f0773d31740d9fdd066d8f1f618e9bf9412cb55f995f3be65da

  • SSDEEP

    1536:Tj+jsMQMOtEvwDpj5HmpJpOUHECgNMo0vp2EMTIzY9:TCjsIOtEvwDpj5HE/OUHnSMm

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024052150acfb281c8fa40cfd4794a3d0926d64cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024052150acfb281c8fa40cfd4794a3d0926d64cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1676
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:2016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    64KB

    MD5

    80d33cbc21dabca75933063b8ddaebac

    SHA1

    dde07107f998e7a45e0b6db0c5a4617c841d223a

    SHA256

    293f9666bf6057ae996c894b6738c4bb0fcf4583ec82ba3f85c98fa4e5ce4aba

    SHA512

    95c531077796075da3c2f58d522db3a4ae511693d7a3755c285878040606ea1621aec1b923c040abf368e75c4f3043f61c475a7c0d9e8893114923b27cfa4f77

  • memory/1676-0-0x0000000000500000-0x000000000050E000-memory.dmp

    Filesize

    56KB

  • memory/1676-1-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/1676-9-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/1676-2-0x0000000000380000-0x0000000000386000-memory.dmp

    Filesize

    24KB

  • memory/1676-15-0x0000000000500000-0x000000000050E000-memory.dmp

    Filesize

    56KB

  • memory/2016-16-0x0000000000500000-0x000000000050E000-memory.dmp

    Filesize

    56KB

  • memory/2016-18-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB

  • memory/2016-25-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2016-26-0x0000000000500000-0x000000000050E000-memory.dmp

    Filesize

    56KB