Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
23/08/2023, 15:47
Static task
static1
Behavioral task
behavioral1
Sample
762d5243a4d445582bd6f0c7e10efe7d_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
762d5243a4d445582bd6f0c7e10efe7d_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
762d5243a4d445582bd6f0c7e10efe7d_cryptolocker_JC.exe
-
Size
59KB
-
MD5
762d5243a4d445582bd6f0c7e10efe7d
-
SHA1
11907ee9c30bff2c5a51dc98e00db344b97ced78
-
SHA256
0c9ac84707414e8371be593b5413c0fd92ae60f29283b668a383080e560f79a4
-
SHA512
daa3e17085b9d8edd2ded09dc52789948e59ed8f97198b2dfd0d43a1b26c3272650eeff334bae13a6b4aab60d3ed5f2243bd2bbc885544c1dade68f046bbcf6b
-
SSDEEP
1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszudTYTjipvF2oqQ:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7Q
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2988 hurok.exe -
Loads dropped DLL 1 IoCs
pid Process 2580 762d5243a4d445582bd6f0c7e10efe7d_cryptolocker_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2580 762d5243a4d445582bd6f0c7e10efe7d_cryptolocker_JC.exe 2988 hurok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2580 wrote to memory of 2988 2580 762d5243a4d445582bd6f0c7e10efe7d_cryptolocker_JC.exe 28 PID 2580 wrote to memory of 2988 2580 762d5243a4d445582bd6f0c7e10efe7d_cryptolocker_JC.exe 28 PID 2580 wrote to memory of 2988 2580 762d5243a4d445582bd6f0c7e10efe7d_cryptolocker_JC.exe 28 PID 2580 wrote to memory of 2988 2580 762d5243a4d445582bd6f0c7e10efe7d_cryptolocker_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\762d5243a4d445582bd6f0c7e10efe7d_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\762d5243a4d445582bd6f0c7e10efe7d_cryptolocker_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\hurok.exe"C:\Users\Admin\AppData\Local\Temp\hurok.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD55ea5e070d555912119d577049afbec16
SHA1f442297a94b23b25a93b50d334040d40af20af6d
SHA2562bd36d31c3ff5c1a210ae5f2d4cab18b4e1f872812cf43bfa121d0c9296d6580
SHA512373767c498b871d2730110cb9e6b206e190b2d8a6de607f40a3fdef14d8d79b8550c425b5f52b7e10be81c15e75b592c98e2e98c6ce486d7d3ca06c1ffe2e576
-
Filesize
59KB
MD55ea5e070d555912119d577049afbec16
SHA1f442297a94b23b25a93b50d334040d40af20af6d
SHA2562bd36d31c3ff5c1a210ae5f2d4cab18b4e1f872812cf43bfa121d0c9296d6580
SHA512373767c498b871d2730110cb9e6b206e190b2d8a6de607f40a3fdef14d8d79b8550c425b5f52b7e10be81c15e75b592c98e2e98c6ce486d7d3ca06c1ffe2e576
-
Filesize
59KB
MD55ea5e070d555912119d577049afbec16
SHA1f442297a94b23b25a93b50d334040d40af20af6d
SHA2562bd36d31c3ff5c1a210ae5f2d4cab18b4e1f872812cf43bfa121d0c9296d6580
SHA512373767c498b871d2730110cb9e6b206e190b2d8a6de607f40a3fdef14d8d79b8550c425b5f52b7e10be81c15e75b592c98e2e98c6ce486d7d3ca06c1ffe2e576