Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
31/08/2023, 16:52
Behavioral task
behavioral1
Sample
f67bf274fd30b1e4b69f14fbc31d317e_cryptolocker_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
f67bf274fd30b1e4b69f14fbc31d317e_cryptolocker_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
f67bf274fd30b1e4b69f14fbc31d317e_cryptolocker_JC.exe
-
Size
92KB
-
MD5
f67bf274fd30b1e4b69f14fbc31d317e
-
SHA1
7f7ad422ac36c5585a19f5234c8e2cdb16337b22
-
SHA256
ef523811b3073a1c58dc0043ff061d4f00addd087131780ee6228c6187288caf
-
SHA512
4025741f759b7220819d8ebfe84271194428175bdc8476efb024b078aa8af4f3dee57375cd5b6f46c5675e810ae6c4edf2455a7cda4bc4ccedcd1d6e5a6f40b6
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp+ofZO:AnBdOOtEvwDpj6zh
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2464 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2224 f67bf274fd30b1e4b69f14fbc31d317e_cryptolocker_JC.exe -
resource yara_rule behavioral1/memory/2224-0-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/files/0x0009000000012029-11.dat upx behavioral1/memory/2224-15-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/files/0x0009000000012029-16.dat upx behavioral1/memory/2464-17-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/files/0x0009000000012029-26.dat upx behavioral1/memory/2464-27-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2464 2224 f67bf274fd30b1e4b69f14fbc31d317e_cryptolocker_JC.exe 28 PID 2224 wrote to memory of 2464 2224 f67bf274fd30b1e4b69f14fbc31d317e_cryptolocker_JC.exe 28 PID 2224 wrote to memory of 2464 2224 f67bf274fd30b1e4b69f14fbc31d317e_cryptolocker_JC.exe 28 PID 2224 wrote to memory of 2464 2224 f67bf274fd30b1e4b69f14fbc31d317e_cryptolocker_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f67bf274fd30b1e4b69f14fbc31d317e_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\f67bf274fd30b1e4b69f14fbc31d317e_cryptolocker_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5ee788824c8ac77d30b25e8c81d9e8956
SHA1845d53a7e0a30c086dd917392cd856c7cb8466d6
SHA2567e1af767f58bf90be065f286d4e8f46bcd8f6e7bc8aaf7e1150d3abd90a42be2
SHA51229a46a99d0b00fe183a9af965548a745977f618d71a93385325a96f9b32bc54fc12103ed1a47bea49b01320cbff62ef017f300e84b1af805e0e4c0732dc3ec47
-
Filesize
92KB
MD5ee788824c8ac77d30b25e8c81d9e8956
SHA1845d53a7e0a30c086dd917392cd856c7cb8466d6
SHA2567e1af767f58bf90be065f286d4e8f46bcd8f6e7bc8aaf7e1150d3abd90a42be2
SHA51229a46a99d0b00fe183a9af965548a745977f618d71a93385325a96f9b32bc54fc12103ed1a47bea49b01320cbff62ef017f300e84b1af805e0e4c0732dc3ec47
-
Filesize
92KB
MD5ee788824c8ac77d30b25e8c81d9e8956
SHA1845d53a7e0a30c086dd917392cd856c7cb8466d6
SHA2567e1af767f58bf90be065f286d4e8f46bcd8f6e7bc8aaf7e1150d3abd90a42be2
SHA51229a46a99d0b00fe183a9af965548a745977f618d71a93385325a96f9b32bc54fc12103ed1a47bea49b01320cbff62ef017f300e84b1af805e0e4c0732dc3ec47