Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
28/08/2023, 16:11
Static task
static1
Behavioral task
behavioral1
Sample
be08a8b0481b31792ceeb376014c5928_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
be08a8b0481b31792ceeb376014c5928_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
be08a8b0481b31792ceeb376014c5928_cryptolocker_JC.exe
-
Size
36KB
-
MD5
be08a8b0481b31792ceeb376014c5928
-
SHA1
72cbc05db0a7c6e454dce78df9b8232304c8bf5e
-
SHA256
23eec827a40997ff1b25ee3150e56c4f51b986ad3e8d0f438bc76d2c286bc368
-
SHA512
82b9b0138d911f937e14729db524b8c679e942e14ce64160cf7a00050d1344f1dace140e84aff6ff0860b18dd3cdbca4fec18f3e861dc231e9f18f9d1b6decaf
-
SSDEEP
384:60VkMq01bJ3wtEwPS8HLEh+Jagz+3be+26aIIcVRYpetOOtEvwDpjqIGRmdHzOO+:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqh64
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3000 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2056 be08a8b0481b31792ceeb376014c5928_cryptolocker_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2056 wrote to memory of 3000 2056 be08a8b0481b31792ceeb376014c5928_cryptolocker_JC.exe 28 PID 2056 wrote to memory of 3000 2056 be08a8b0481b31792ceeb376014c5928_cryptolocker_JC.exe 28 PID 2056 wrote to memory of 3000 2056 be08a8b0481b31792ceeb376014c5928_cryptolocker_JC.exe 28 PID 2056 wrote to memory of 3000 2056 be08a8b0481b31792ceeb376014c5928_cryptolocker_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\be08a8b0481b31792ceeb376014c5928_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\be08a8b0481b31792ceeb376014c5928_cryptolocker_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5d270444389759524f0d2462d20bed367
SHA14959ee409caa005c57f6ab9dbb0fb7afe0b794f3
SHA2565fdac61f13b97567b01fd24f569e7c56519cc944520c7128568dd407cda7c950
SHA5126eab45d42c858b354a9e6ecc9c7f179a80c5f294ea37b0f8066b532a027be6e3699342c2235535da8b3c5acb3a28169edd5eb0e06a6be4b26a470de9efc9219f
-
Filesize
36KB
MD5d270444389759524f0d2462d20bed367
SHA14959ee409caa005c57f6ab9dbb0fb7afe0b794f3
SHA2565fdac61f13b97567b01fd24f569e7c56519cc944520c7128568dd407cda7c950
SHA5126eab45d42c858b354a9e6ecc9c7f179a80c5f294ea37b0f8066b532a027be6e3699342c2235535da8b3c5acb3a28169edd5eb0e06a6be4b26a470de9efc9219f
-
Filesize
36KB
MD5d270444389759524f0d2462d20bed367
SHA14959ee409caa005c57f6ab9dbb0fb7afe0b794f3
SHA2565fdac61f13b97567b01fd24f569e7c56519cc944520c7128568dd407cda7c950
SHA5126eab45d42c858b354a9e6ecc9c7f179a80c5f294ea37b0f8066b532a027be6e3699342c2235535da8b3c5acb3a28169edd5eb0e06a6be4b26a470de9efc9219f