Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
06/11/2023, 20:18
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-27_5b710213f554648a861addf5291ee034_cryptolocker.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.2023-09-27_5b710213f554648a861addf5291ee034_cryptolocker.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.2023-09-27_5b710213f554648a861addf5291ee034_cryptolocker.exe
-
Size
35KB
-
MD5
5b710213f554648a861addf5291ee034
-
SHA1
10232956316337a4556722dcf98604e1890dddc1
-
SHA256
5a3620ac8703aade34d8a0581cbce0e3c8b30c38a06f725e079c3051b512cabd
-
SHA512
dc9ed517353393c667f4c0216c9c39addf7217ec7ccf3d39112a1b0aa09f901483aed2fa15ccac1c78311ba46f1411030ccca98f4810e41985e8d6728b587a99
-
SSDEEP
384:bgX4uGLLQRcsdeQ7/nQu63Ag7YmecFanrlwfjDUkKDfWf0w3sp8u5c/sl3:bgX4zYcgTEu6QOaryfjqDDw3sCu5Usl3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2664 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 2176 NEAS.2023-09-27_5b710213f554648a861addf5291ee034_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2664 2176 NEAS.2023-09-27_5b710213f554648a861addf5291ee034_cryptolocker.exe 28 PID 2176 wrote to memory of 2664 2176 NEAS.2023-09-27_5b710213f554648a861addf5291ee034_cryptolocker.exe 28 PID 2176 wrote to memory of 2664 2176 NEAS.2023-09-27_5b710213f554648a861addf5291ee034_cryptolocker.exe 28 PID 2176 wrote to memory of 2664 2176 NEAS.2023-09-27_5b710213f554648a861addf5291ee034_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-27_5b710213f554648a861addf5291ee034_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-27_5b710213f554648a861addf5291ee034_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5049f0522db18ef0cbc2e5cbfd54e5ab1
SHA1a4920e1592e3c02d404b6b9af2fc823f737c6880
SHA256041fd8aa7567ae6364433fdbce333de78c55240b21b9fde3d926462bf5321865
SHA512e15de483dd2bbcdfbcfd81e52c75cd264e5f8d98cff07c26a4c6d48893d62bf818be0099079fd193a408db4671ef7ebcfaa1145daa07e6d0b91da9ac2fd449d0
-
Filesize
35KB
MD5049f0522db18ef0cbc2e5cbfd54e5ab1
SHA1a4920e1592e3c02d404b6b9af2fc823f737c6880
SHA256041fd8aa7567ae6364433fdbce333de78c55240b21b9fde3d926462bf5321865
SHA512e15de483dd2bbcdfbcfd81e52c75cd264e5f8d98cff07c26a4c6d48893d62bf818be0099079fd193a408db4671ef7ebcfaa1145daa07e6d0b91da9ac2fd449d0
-
Filesize
35KB
MD5049f0522db18ef0cbc2e5cbfd54e5ab1
SHA1a4920e1592e3c02d404b6b9af2fc823f737c6880
SHA256041fd8aa7567ae6364433fdbce333de78c55240b21b9fde3d926462bf5321865
SHA512e15de483dd2bbcdfbcfd81e52c75cd264e5f8d98cff07c26a4c6d48893d62bf818be0099079fd193a408db4671ef7ebcfaa1145daa07e6d0b91da9ac2fd449d0