Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 21:24

General

  • Target

    2024-09-08_b98c65e12d13e4105122023b30105594_cryptolocker.exe

  • Size

    39KB

  • MD5

    b98c65e12d13e4105122023b30105594

  • SHA1

    91bd77c8885f786c141093871665addeeceac353

  • SHA256

    aae9e5b7dbcefdc4840f56aa96eea2fc3df54f7ac29b46061054c659d9be351a

  • SHA512

    bfdb700f68e7a6ce63d6331d9d06c40acf3230fca5e01d022a593b65b354a41c2e446ea7ca0aebf5f30a06231632fab57025215e97240048fb68a05dd0fde637

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITz:qDdFJy3QMOtEvwDpjjWMl7Tz

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-08_b98c65e12d13e4105122023b30105594_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-08_b98c65e12d13e4105122023b30105594_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2960
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    40KB

    MD5

    2613ba0a9afc19f224d10a3637ae9605

    SHA1

    e1cf975d3261c5ddd163568f92beb07025d8c5d9

    SHA256

    929419f61bd6c9ec700b25c1e792a8ba54616222810f264f9e870861a97213a5

    SHA512

    36f0b3f9fa5fd9087650d1ee64fe4fb87ba6b0a5f1141a0233f142189cc55562511fde6f2f948d24806a26fbe0adbab6244b85715619df87d5ce2ac817d53d70

  • memory/1692-26-0x00000000002C0000-0x00000000002C6000-memory.dmp

    Filesize

    24KB

  • memory/1692-27-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2960-0-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2960-1-0x0000000000320000-0x0000000000326000-memory.dmp

    Filesize

    24KB

  • memory/2960-9-0x0000000000320000-0x0000000000326000-memory.dmp

    Filesize

    24KB

  • memory/2960-2-0x0000000000460000-0x0000000000466000-memory.dmp

    Filesize

    24KB

  • memory/2960-17-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2960-14-0x0000000002740000-0x0000000002750000-memory.dmp

    Filesize

    64KB