Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    14/10/2024, 07:30

General

  • Target

    2024-10-14_bb552ab72785847c52b632cd63af2e34_cryptolocker.exe

  • Size

    43KB

  • MD5

    bb552ab72785847c52b632cd63af2e34

  • SHA1

    bef9f638413228a20567ac464f601290f679a122

  • SHA256

    1cfe8f89c50ebd3f515c21aa79243d8dc7deccff1ff486711d01542e764174ad

  • SHA512

    e1ee277aa6d2a9fb351508acf8a971001f0178e26ba04c2d3a17de155012c13d1774be6bfed568cbaa0c2a273d9b7950ffe8f6d71c76d3e4aa8722f9c0dcb1f9

  • SSDEEP

    384:bm74uGLLQRcsdeQ72ngEr4K7YmE8jb0nrlwfjDUkz:bm74zYcgT/EkM0ryfjvz

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-14_bb552ab72785847c52b632cd63af2e34_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-14_bb552ab72785847c52b632cd63af2e34_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1456
    • C:\Users\Admin\AppData\Local\Temp\hasfj.exe
      "C:\Users\Admin\AppData\Local\Temp\hasfj.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2192

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hasfj.exe

    Filesize

    43KB

    MD5

    deea7d7d3d8ac2da823b106c5d9f90a9

    SHA1

    d1be03175686e82d77c508e77effd32e33139894

    SHA256

    b184e8dee7905067c2016b543f68b4c17025487e5a0b6b901091026bcd57749d

    SHA512

    7aec473eb6c6d171c36fd8fd6dbc5be3a70aa9a13313ca6d7bb9b3a8e2bfa3fbdf41aad5e2fb58d9a00a8dce541f5d96df9fe6b83a9772c67ba82593bc09b7ba

  • memory/1456-0-0x0000000008000000-0x000000000800D000-memory.dmp

    Filesize

    52KB

  • memory/1456-1-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

  • memory/1456-2-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

  • memory/1456-3-0x0000000000390000-0x0000000000396000-memory.dmp

    Filesize

    24KB

  • memory/1456-15-0x0000000008000000-0x000000000800D000-memory.dmp

    Filesize

    52KB

  • memory/2192-17-0x00000000002B0000-0x00000000002B6000-memory.dmp

    Filesize

    24KB

  • memory/2192-24-0x00000000002A0000-0x00000000002A6000-memory.dmp

    Filesize

    24KB

  • memory/2192-25-0x0000000008000000-0x000000000800D000-memory.dmp

    Filesize

    52KB