Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
04/08/2023, 17:03
Static task
static1
Behavioral task
behavioral1
Sample
61b20990990ba335359389cf64a55815_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
61b20990990ba335359389cf64a55815_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
61b20990990ba335359389cf64a55815_cryptolocker_JC.exe
-
Size
121KB
-
MD5
61b20990990ba335359389cf64a55815
-
SHA1
cbe4dae2794c404708480594d4ba36dee1c8be02
-
SHA256
6eb51ac13c4dbf631c5437032a9f880cc04fbbefe67c2585252f479897555dda
-
SHA512
0939e7490f6930be3952756fa8bbd977a5dd3d6929bb6d032f36993bc975c96b7bce56b062432129fc1ab60e2751e05b491f9faa9836b38364db4f25f4348faf
-
SSDEEP
1536:vj+jsMQMOtEvwDpj5HwYYTjipvF2hBfIuBKLUYOVd:vCjsIOtEvwDpj5H9YvQd2H
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2892 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2264 61b20990990ba335359389cf64a55815_cryptolocker_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2892 2264 61b20990990ba335359389cf64a55815_cryptolocker_JC.exe 28 PID 2264 wrote to memory of 2892 2264 61b20990990ba335359389cf64a55815_cryptolocker_JC.exe 28 PID 2264 wrote to memory of 2892 2264 61b20990990ba335359389cf64a55815_cryptolocker_JC.exe 28 PID 2264 wrote to memory of 2892 2264 61b20990990ba335359389cf64a55815_cryptolocker_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\61b20990990ba335359389cf64a55815_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\61b20990990ba335359389cf64a55815_cryptolocker_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
121KB
MD57973d3bf7b4f7258480d82be93a1d938
SHA163c21d8b56052ece729577694dcb65b76833825b
SHA256b0f637671744b705e9ec3dca4b17d298d7b4b3bc623b5851eafe9e0d599ac2e8
SHA512b51bd7230e4beb51a5cebf872a5d40a1e5d15e9f37a7ca6887a18de69a87a3371d086de16f46c94f797b0553807621e217afec1ed7eda9633178cd5d26f1dc3e
-
Filesize
121KB
MD57973d3bf7b4f7258480d82be93a1d938
SHA163c21d8b56052ece729577694dcb65b76833825b
SHA256b0f637671744b705e9ec3dca4b17d298d7b4b3bc623b5851eafe9e0d599ac2e8
SHA512b51bd7230e4beb51a5cebf872a5d40a1e5d15e9f37a7ca6887a18de69a87a3371d086de16f46c94f797b0553807621e217afec1ed7eda9633178cd5d26f1dc3e
-
Filesize
121KB
MD57973d3bf7b4f7258480d82be93a1d938
SHA163c21d8b56052ece729577694dcb65b76833825b
SHA256b0f637671744b705e9ec3dca4b17d298d7b4b3bc623b5851eafe9e0d599ac2e8
SHA512b51bd7230e4beb51a5cebf872a5d40a1e5d15e9f37a7ca6887a18de69a87a3371d086de16f46c94f797b0553807621e217afec1ed7eda9633178cd5d26f1dc3e