Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    27/05/2024, 19:30

General

  • Target

    2024-05-27_bd1f055cfa24cc95aea571cb27a1e3fe_cryptolocker.exe

  • Size

    35KB

  • MD5

    bd1f055cfa24cc95aea571cb27a1e3fe

  • SHA1

    a9228485f22d16081b0491ab2d669e6cac9d8136

  • SHA256

    56067dff8bfcb89920a83fd135034fc7acba6b2f507d6b55f9c1067ab25feb50

  • SHA512

    272c274846e12aad7d63af7f1832f744a4d6fbb388c8f8517071cc0c19041fbd1903cb6f9f6198911804f3c69cdb062dcc63fc4d23dfac187eb9de7d58c78386

  • SSDEEP

    768:bxNQIE0eBhkL2Fo1CCwgfjOg9Arbkzos5M4gt:bxNrC7kYo1Fxf2rYA3t

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-27_bd1f055cfa24cc95aea571cb27a1e3fe_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-27_bd1f055cfa24cc95aea571cb27a1e3fe_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Users\Admin\AppData\Local\Temp\pissa.exe
      "C:\Users\Admin\AppData\Local\Temp\pissa.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:2080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\pissa.exe

    Filesize

    35KB

    MD5

    6ac351f5693d1f40eed970f332e46381

    SHA1

    f218c482e8fe995c2d223f12dab312a95770e59a

    SHA256

    735503704a74ce5d7b2b53586e29e451f7346bfed2d4b91737b53fbed1d1b7d2

    SHA512

    8e62e5fa14dc13311e75510d53651b857fd107483b4c04a1f92b45f2fbae9946bb0a540d878da4c215c1b22bc80696e223727223d83868300fab6c98f17c4c6c

  • memory/2080-15-0x0000000000330000-0x0000000000336000-memory.dmp

    Filesize

    24KB

  • memory/2080-22-0x0000000000320000-0x0000000000326000-memory.dmp

    Filesize

    24KB

  • memory/2244-0-0x0000000000480000-0x0000000000486000-memory.dmp

    Filesize

    24KB

  • memory/2244-1-0x0000000000490000-0x0000000000496000-memory.dmp

    Filesize

    24KB

  • memory/2244-9-0x0000000000480000-0x0000000000486000-memory.dmp

    Filesize

    24KB