Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    30/06/2024, 02:03

General

  • Target

    2024-06-30_941b5967881673d75b4a783e913e8e8d_cryptolocker.exe

  • Size

    78KB

  • MD5

    941b5967881673d75b4a783e913e8e8d

  • SHA1

    e4d374b7705939c9ddf2066c984405dab5dab8c5

  • SHA256

    7b6966d7eb22725dbb68723a335d931c6a36187ccd479ab550b2278471b8f70d

  • SHA512

    20fe9fb64fba1c77193a87f2c6dd320ce7cf11ee7a737126734ddcf542818d1069f80d1a6106737d0cf504768fcded150935ca790d34768afabcce95ec68acb2

  • SSDEEP

    1536:X6QFElP6n+gJQMOtEvwDpjBZYTjipvF2bx1rHsoLktD:X6a+SOtEvwDpjBZYvQd2C

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-30_941b5967881673d75b4a783e913e8e8d_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-30_941b5967881673d75b4a783e913e8e8d_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2384
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2296

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    78KB

    MD5

    c56e198d4cd212524d1a9f0694041ea1

    SHA1

    e596ef7cb97af560f6d523063dc870c189fa6ad7

    SHA256

    f81471e58ef67eb1d1673c233ccb8b42772a24e4ad87c9bd95af6175f4f84a4c

    SHA512

    013b6d377ae3417b29fdd92d9c3614a1af5d62d332aef816a55e6bfc89985f8264a5541d520476381167ff2710ca179dfda621a2f9c31be08f6a224e5e165a27

  • memory/2296-22-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2296-15-0x0000000000480000-0x0000000000486000-memory.dmp

    Filesize

    24KB

  • memory/2384-0-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2384-8-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2384-1-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB