Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
04/08/2023, 14:42
Static task
static1
Behavioral task
behavioral1
Sample
57ff2db9e34446b11f584e84369f5b60_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
57ff2db9e34446b11f584e84369f5b60_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
57ff2db9e34446b11f584e84369f5b60_cryptolocker_JC.exe
-
Size
74KB
-
MD5
57ff2db9e34446b11f584e84369f5b60
-
SHA1
418189bf9d2b58fa194b51c1598c0e9bcb932275
-
SHA256
e1887f3717fe3088e78b57f1bee69c9d4eeb9d3190437d8e10bbc1d1c42e610c
-
SHA512
3fb171d71bff309015d1b9f3ba14e03a950023cfff25956171234baf72af8fab365e2b483f10429513d60a009f095beed48b7688a5e8b55f6c0230cfa2e84b21
-
SSDEEP
1536:ZzFbxmLPWQMOtEvwDpj386Sj/WprgJNpsAnJYqdIRAc3:ZVxkGOtEvwDpjcNY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1740 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2488 57ff2db9e34446b11f584e84369f5b60_cryptolocker_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2488 wrote to memory of 1740 2488 57ff2db9e34446b11f584e84369f5b60_cryptolocker_JC.exe 28 PID 2488 wrote to memory of 1740 2488 57ff2db9e34446b11f584e84369f5b60_cryptolocker_JC.exe 28 PID 2488 wrote to memory of 1740 2488 57ff2db9e34446b11f584e84369f5b60_cryptolocker_JC.exe 28 PID 2488 wrote to memory of 1740 2488 57ff2db9e34446b11f584e84369f5b60_cryptolocker_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\57ff2db9e34446b11f584e84369f5b60_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\57ff2db9e34446b11f584e84369f5b60_cryptolocker_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:1740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD5f03bd318da8adc6b14f4a335fd7fa142
SHA13205b64076eb6e463b80a452eadebf1f57452358
SHA256b3de65dbfcce38c12d792e7a28c2cb03d130c80f8d26e22237ac30ac94d44df0
SHA512f9fee1c5a2dec189c8eea9514cee1dcf7c0b4213b94dc43240510206a3075251b7589246f7205da87b1191f56b08b8dfba4ad145308ad8ffeb3440187c1a6c3d
-
Filesize
74KB
MD5f03bd318da8adc6b14f4a335fd7fa142
SHA13205b64076eb6e463b80a452eadebf1f57452358
SHA256b3de65dbfcce38c12d792e7a28c2cb03d130c80f8d26e22237ac30ac94d44df0
SHA512f9fee1c5a2dec189c8eea9514cee1dcf7c0b4213b94dc43240510206a3075251b7589246f7205da87b1191f56b08b8dfba4ad145308ad8ffeb3440187c1a6c3d
-
Filesize
74KB
MD5f03bd318da8adc6b14f4a335fd7fa142
SHA13205b64076eb6e463b80a452eadebf1f57452358
SHA256b3de65dbfcce38c12d792e7a28c2cb03d130c80f8d26e22237ac30ac94d44df0
SHA512f9fee1c5a2dec189c8eea9514cee1dcf7c0b4213b94dc43240510206a3075251b7589246f7205da87b1191f56b08b8dfba4ad145308ad8ffeb3440187c1a6c3d