Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05/01/2024, 05:37
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-01_07df902ddda52b3f25c0f6caf76c6040_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-01_07df902ddda52b3f25c0f6caf76c6040_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-01_07df902ddda52b3f25c0f6caf76c6040_cryptolocker.exe
-
Size
35KB
-
MD5
07df902ddda52b3f25c0f6caf76c6040
-
SHA1
f3c9047184913368f45360c99b3dd81d9e7d5b70
-
SHA256
60a83fcf1f905c3513fbb463e30c8c81f341b3315ed0b001e3b2453343910857
-
SHA512
73495f15fd83e4795d8e2f3bff218ce7750e652238d9b8b3ec044b41d95ae450afadd3d7bd53f1afe99c5f1f02a2392bd9fc83c7ec98bc1e3338ba791bf72f16
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBVaD3TP7Dtx:X6QFElP6n+gJQMOtEvwDpjBmzDD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2692 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2184 2024-01-01_07df902ddda52b3f25c0f6caf76c6040_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2692 2184 2024-01-01_07df902ddda52b3f25c0f6caf76c6040_cryptolocker.exe 28 PID 2184 wrote to memory of 2692 2184 2024-01-01_07df902ddda52b3f25c0f6caf76c6040_cryptolocker.exe 28 PID 2184 wrote to memory of 2692 2184 2024-01-01_07df902ddda52b3f25c0f6caf76c6040_cryptolocker.exe 28 PID 2184 wrote to memory of 2692 2184 2024-01-01_07df902ddda52b3f25c0f6caf76c6040_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-01_07df902ddda52b3f25c0f6caf76c6040_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-01_07df902ddda52b3f25c0f6caf76c6040_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5674e73241ab14593034c544105e52555
SHA1f28dec141555bcccc59962670f1e786d02842145
SHA25649184d2fcbe7bc3235d109f7d60b4396922efb357a0169a1a922ab8601097778
SHA512c378f85a49f0556986b8fa2e2176794f9fe0632e9b495591ea21c10af2de4805bfd2eaf1bbf2483ec8609a4d317927bcd11fe6deb4ca89dc24be3c51fb2ae661