Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
02/09/2023, 19:20
Behavioral task
behavioral1
Sample
2023-08-22_7295b5042553809b95f4f77b20d43025_cryptolocker_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-22_7295b5042553809b95f4f77b20d43025_cryptolocker_JC.exe
Resource
win10v2004-20230831-en
General
-
Target
2023-08-22_7295b5042553809b95f4f77b20d43025_cryptolocker_JC.exe
-
Size
145KB
-
MD5
7295b5042553809b95f4f77b20d43025
-
SHA1
321faf04db74101ea632298abafbbeffb954e593
-
SHA256
928476d931b09fb2ec850737fa0629c34f17772dab1064829d3f23ecd0ab40d0
-
SHA512
282fe25758ec74c50db66fb5e53881f3c129d854ece76926fcdafc5dd3d837faa01df5520d110598819d64b88e7000d9217bb84e040073dc2014cd884de2861a
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNgp699GNtL1eex:T6a+rdOOtEvwDpjLz4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 560 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2064 2023-08-22_7295b5042553809b95f4f77b20d43025_cryptolocker_JC.exe -
resource yara_rule behavioral1/memory/2064-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x00060000000120e4-11.dat upx behavioral1/files/0x00060000000120e4-14.dat upx behavioral1/memory/560-16-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2064-15-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x00060000000120e4-25.dat upx behavioral1/memory/560-26-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2064 wrote to memory of 560 2064 2023-08-22_7295b5042553809b95f4f77b20d43025_cryptolocker_JC.exe 28 PID 2064 wrote to memory of 560 2064 2023-08-22_7295b5042553809b95f4f77b20d43025_cryptolocker_JC.exe 28 PID 2064 wrote to memory of 560 2064 2023-08-22_7295b5042553809b95f4f77b20d43025_cryptolocker_JC.exe 28 PID 2064 wrote to memory of 560 2064 2023-08-22_7295b5042553809b95f4f77b20d43025_cryptolocker_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-22_7295b5042553809b95f4f77b20d43025_cryptolocker_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-22_7295b5042553809b95f4f77b20d43025_cryptolocker_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145KB
MD54eec5e9ef65779b3aefb570c1c73beee
SHA1a2ab3cd7dd74729606802d15c907c833a81a9347
SHA256662a063ab241a7c86b4faa317ca88b92aaf1e9ee8b7f9bffff2ade3e18496ae5
SHA512699642be08cbad92b66518d6bca55a60c1221a35f15e1ebbb3babbd889f14ba45985ead956828529219fd2d869dce897ec17971a8c7004e1a59b9a7bfaabef65
-
Filesize
145KB
MD54eec5e9ef65779b3aefb570c1c73beee
SHA1a2ab3cd7dd74729606802d15c907c833a81a9347
SHA256662a063ab241a7c86b4faa317ca88b92aaf1e9ee8b7f9bffff2ade3e18496ae5
SHA512699642be08cbad92b66518d6bca55a60c1221a35f15e1ebbb3babbd889f14ba45985ead956828529219fd2d869dce897ec17971a8c7004e1a59b9a7bfaabef65
-
Filesize
145KB
MD54eec5e9ef65779b3aefb570c1c73beee
SHA1a2ab3cd7dd74729606802d15c907c833a81a9347
SHA256662a063ab241a7c86b4faa317ca88b92aaf1e9ee8b7f9bffff2ade3e18496ae5
SHA512699642be08cbad92b66518d6bca55a60c1221a35f15e1ebbb3babbd889f14ba45985ead956828529219fd2d869dce897ec17971a8c7004e1a59b9a7bfaabef65