Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 05:29

General

  • Target

    2024-09-19_5420cfc3c5f1f433227a00b7d898fc93_cryptolocker.exe

  • Size

    40KB

  • MD5

    5420cfc3c5f1f433227a00b7d898fc93

  • SHA1

    95b44a01c4dd4eb3e24ead0b7d06d37913c2eb2e

  • SHA256

    3e00497e7c360681519b885786625686a409efa42baf2fb300f1c1c1e8b51d21

  • SHA512

    6090b95a261fc9fe818aa1ba41da12e784d5598b88bb15dfc94120b7cd7f8b9e18451a82503b4b100c41452f2a47a810b46447e39a7161910734bc108623d6f1

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITm:qDdFJy3QMOtEvwDpjjWMl7Tm

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-19_5420cfc3c5f1f433227a00b7d898fc93_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-19_5420cfc3c5f1f433227a00b7d898fc93_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2104

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    40KB

    MD5

    1bd2b0d6149a31850901dca1f5dca531

    SHA1

    0fce4d8307edc2023db266b87a4c5931c3e31542

    SHA256

    fb9396076df0d2db6601bac62c5b0dea7676d27c7fa83c98ffaec65baab58d0c

    SHA512

    5a95bd94d2cb5b3673638e7262e06a3ca7b04baa485409ea3ff02a53b6bf55cc009c7a9e5f542d8e5241195916cc4dfb15b9cbe158ddd58976605e7f1426edcc

  • memory/2104-17-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2104-19-0x0000000000530000-0x0000000000536000-memory.dmp

    Filesize

    24KB

  • memory/2104-26-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB

  • memory/2104-27-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2700-0-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2700-9-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2700-2-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB

  • memory/2700-1-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2700-16-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB