Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2024, 15:24

General

  • Target

    2024-10-12_fe07e41be3f6298c7febe3fb92468a83_cryptolocker.exe

  • Size

    46KB

  • MD5

    fe07e41be3f6298c7febe3fb92468a83

  • SHA1

    8809be62857c5e92f45169be908f49378dead5a7

  • SHA256

    840d6202cf4aef93eba58c8b14d15cc9684c0cc751b48d5ca4818e1acc893aaa

  • SHA512

    aff241a0215301a731e49e5a0b955e86955ce81226d30809d4ca806f46e58672a975acd291b1ac99bf55d161d4fc5a0ed169159b8dd3045aa525cb4f9b6cbdcd

  • SSDEEP

    384:bm74uGLLQRcsdeQ72ngEr4K7YmE8jb0nrlwfjDUk3b+NKIF:bm74zYcgT/EkM0ryfjd3WKIF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-12_fe07e41be3f6298c7febe3fb92468a83_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-12_fe07e41be3f6298c7febe3fb92468a83_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2696
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    46KB

    MD5

    a75ee5636a1557e5e6614e41033cdeec

    SHA1

    011921c37c3205e5864c1b2c15e109dffa127b2b

    SHA256

    79875d02b376ee299679cb3fa3bffd303224a5ba09b947546c31faeca4327ef4

    SHA512

    32a2d5f8202a5713ae6ce7949ee7644ab39fef9050ab631c54927461137be195eecde4a52dbe0be662dd4f77dd6dfe14f73feb910232d2c9fe32bfe1d31583b1

  • memory/2220-17-0x0000000008000000-0x000000000800D000-memory.dmp

    Filesize

    52KB

  • memory/2220-19-0x0000000000370000-0x0000000000376000-memory.dmp

    Filesize

    24KB

  • memory/2220-26-0x0000000000360000-0x0000000000366000-memory.dmp

    Filesize

    24KB

  • memory/2220-27-0x0000000008000000-0x000000000800D000-memory.dmp

    Filesize

    52KB

  • memory/2696-0-0x0000000008000000-0x000000000800D000-memory.dmp

    Filesize

    52KB

  • memory/2696-1-0x0000000000470000-0x0000000000476000-memory.dmp

    Filesize

    24KB

  • memory/2696-9-0x0000000000470000-0x0000000000476000-memory.dmp

    Filesize

    24KB

  • memory/2696-2-0x0000000000480000-0x0000000000486000-memory.dmp

    Filesize

    24KB

  • memory/2696-13-0x0000000001DA0000-0x0000000001DAD000-memory.dmp

    Filesize

    52KB

  • memory/2696-15-0x0000000008000000-0x000000000800D000-memory.dmp

    Filesize

    52KB