Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230824-en -
resource tags
arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2023, 15:39
Behavioral task
behavioral1
Sample
ce49a2acb39c49bfb81017ccdd4db2ea_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
ce49a2acb39c49bfb81017ccdd4db2ea_cryptolocker_JC.exe
Resource
win10v2004-20230824-en
General
-
Target
ce49a2acb39c49bfb81017ccdd4db2ea_cryptolocker_JC.exe
-
Size
80KB
-
MD5
ce49a2acb39c49bfb81017ccdd4db2ea
-
SHA1
d6019072d9452e0573f0c8688a55707784fb1379
-
SHA256
b99f6fb040a3d0e6f4462f5d3c57553066a5821c097f4f3e2706ed4ccc69c61e
-
SHA512
887c29f8e37a59d4d93806e1e26b84fb137b28d5b316363a5ec66e5697d8201d31486830dd0a0c724d86c3fb539acb3ec8bdacebc7d7fb457f6be6f6ac06007a
-
SSDEEP
768:qkmnjFom/kLyMro2GtOOtEvwDpjeY10Y/YMsvlMdwPK80GQuchoIn:qkmnpomddpMOtEvwDpjJGYQbN/PKwMn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3888 asih.exe -
resource yara_rule behavioral2/memory/884-0-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/files/0x000600000002302c-14.dat upx behavioral2/files/0x000600000002302c-18.dat upx behavioral2/files/0x000600000002302c-19.dat upx behavioral2/memory/884-26-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/memory/3888-33-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{C1DA2D26-729C-41F5-AB7D-E1AA347DCD87}.catalogItem svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 884 wrote to memory of 3888 884 ce49a2acb39c49bfb81017ccdd4db2ea_cryptolocker_JC.exe 86 PID 884 wrote to memory of 3888 884 ce49a2acb39c49bfb81017ccdd4db2ea_cryptolocker_JC.exe 86 PID 884 wrote to memory of 3888 884 ce49a2acb39c49bfb81017ccdd4db2ea_cryptolocker_JC.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce49a2acb39c49bfb81017ccdd4db2ea_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\ce49a2acb39c49bfb81017ccdd4db2ea_cryptolocker_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:3888
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
PID:5060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD57f312900056092dbc12a71374717b3fe
SHA12961995398acf867f1e45593881619d3611db653
SHA2565265c07398406f94d876f4457550520a08ebbd40a1c51db5d6998c16101aca00
SHA512c67083ee6afaeb5d1578c6e33f1e00332e57f008248d20e92c8bdc7b5050b7b32f779815afc0ed309a56efdc47fdf48f426312ec41311cec57e8e58121bef0fb
-
Filesize
80KB
MD57f312900056092dbc12a71374717b3fe
SHA12961995398acf867f1e45593881619d3611db653
SHA2565265c07398406f94d876f4457550520a08ebbd40a1c51db5d6998c16101aca00
SHA512c67083ee6afaeb5d1578c6e33f1e00332e57f008248d20e92c8bdc7b5050b7b32f779815afc0ed309a56efdc47fdf48f426312ec41311cec57e8e58121bef0fb
-
Filesize
80KB
MD57f312900056092dbc12a71374717b3fe
SHA12961995398acf867f1e45593881619d3611db653
SHA2565265c07398406f94d876f4457550520a08ebbd40a1c51db5d6998c16101aca00
SHA512c67083ee6afaeb5d1578c6e33f1e00332e57f008248d20e92c8bdc7b5050b7b32f779815afc0ed309a56efdc47fdf48f426312ec41311cec57e8e58121bef0fb