Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
06/08/2023, 18:56
Behavioral task
behavioral1
Sample
944b5a181f899fe14c53588b0981520d_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
944b5a181f899fe14c53588b0981520d_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
944b5a181f899fe14c53588b0981520d_cryptolocker_JC.exe
-
Size
98KB
-
MD5
944b5a181f899fe14c53588b0981520d
-
SHA1
3f77cadd471c35d6eb04b00cdd2437b393815ff8
-
SHA256
a27c459d7602ecd32c291df62955b38f56bcbe9f901124ffa3030babd3444c02
-
SHA512
68e95a9f5d8d8315219df77e350dd9d680b83a352659d3062ff3fefa1c482e5e722d19e7885c0a79bf4fcf8447ea138c81e8eee5ba4d865673bbf077aaa909e7
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GCa:1nK6a+qdOOtEvwDpj/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2948 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 632 944b5a181f899fe14c53588b0981520d_cryptolocker_JC.exe -
resource yara_rule behavioral1/memory/632-54-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral1/memory/632-70-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral1/files/0x0007000000012107-69.dat upx behavioral1/files/0x0007000000012107-65.dat upx behavioral1/memory/2948-71-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral1/files/0x0007000000012107-79.dat upx behavioral1/memory/2948-81-0x0000000000500000-0x000000000050F311-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 632 wrote to memory of 2948 632 944b5a181f899fe14c53588b0981520d_cryptolocker_JC.exe 30 PID 632 wrote to memory of 2948 632 944b5a181f899fe14c53588b0981520d_cryptolocker_JC.exe 30 PID 632 wrote to memory of 2948 632 944b5a181f899fe14c53588b0981520d_cryptolocker_JC.exe 30 PID 632 wrote to memory of 2948 632 944b5a181f899fe14c53588b0981520d_cryptolocker_JC.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\944b5a181f899fe14c53588b0981520d_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\944b5a181f899fe14c53588b0981520d_cryptolocker_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98KB
MD562ac4d6dcb8530b5ea9cad090fabdf96
SHA12e6b40303f15328a980f4807a09ef238ed0e4b73
SHA256b15b4564ae9e358c417edea54c2bc42ae447b66238d815e79e2295c8834c4bb1
SHA51200194ac587f95670e44d5848d080a01b969ef4a192e84b51b57c1457a58f2e36cf4edef36758cc89cbaca779bf79cfc8e4eab3f30f8413953698ec74b9a37589
-
Filesize
98KB
MD562ac4d6dcb8530b5ea9cad090fabdf96
SHA12e6b40303f15328a980f4807a09ef238ed0e4b73
SHA256b15b4564ae9e358c417edea54c2bc42ae447b66238d815e79e2295c8834c4bb1
SHA51200194ac587f95670e44d5848d080a01b969ef4a192e84b51b57c1457a58f2e36cf4edef36758cc89cbaca779bf79cfc8e4eab3f30f8413953698ec74b9a37589
-
Filesize
98KB
MD562ac4d6dcb8530b5ea9cad090fabdf96
SHA12e6b40303f15328a980f4807a09ef238ed0e4b73
SHA256b15b4564ae9e358c417edea54c2bc42ae447b66238d815e79e2295c8834c4bb1
SHA51200194ac587f95670e44d5848d080a01b969ef4a192e84b51b57c1457a58f2e36cf4edef36758cc89cbaca779bf79cfc8e4eab3f30f8413953698ec74b9a37589