Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05/01/2024, 05:48
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-01_a8cc6ae17a80640733844d7e99f3905a_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-01_a8cc6ae17a80640733844d7e99f3905a_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-01_a8cc6ae17a80640733844d7e99f3905a_cryptolocker.exe
-
Size
65KB
-
MD5
a8cc6ae17a80640733844d7e99f3905a
-
SHA1
14c1c8758873538fd56cd23afdfa09c3f948aa4a
-
SHA256
5064fc8a5cf7b83b6e0a8cea12a43611d43e718d45449fdadf491a89e57fe6b5
-
SHA512
ba6a5a6943bc99124040b842d835ffe6dd897dd75cff5bc9caebd7a6bee06695c2885f87c1012aff267a3381387ad88bc7f43d1c9928744a88c1d45ae2495c4b
-
SSDEEP
1536:Dk/xY0sllyGQMOtEvwDpjwycDtKkQZQRKb61vSbgZ3QzNKwU1:DW60sllyWOtEvwDpjwF85s
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2248 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 1728 2024-01-01_a8cc6ae17a80640733844d7e99f3905a_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2248 1728 2024-01-01_a8cc6ae17a80640733844d7e99f3905a_cryptolocker.exe 15 PID 1728 wrote to memory of 2248 1728 2024-01-01_a8cc6ae17a80640733844d7e99f3905a_cryptolocker.exe 15 PID 1728 wrote to memory of 2248 1728 2024-01-01_a8cc6ae17a80640733844d7e99f3905a_cryptolocker.exe 15 PID 1728 wrote to memory of 2248 1728 2024-01-01_a8cc6ae17a80640733844d7e99f3905a_cryptolocker.exe 15
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-01_a8cc6ae17a80640733844d7e99f3905a_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-01_a8cc6ae17a80640733844d7e99f3905a_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2248
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD56204e8535c1391cafa1c624c6bff8060
SHA186e78dec51ad9d765e9120817fabe01dd8fc04a7
SHA2563c770d4cfda747bba8aec3be4d118fa6048bf8579ea818ce8324974006e5e1f2
SHA5121c5c47225f826ee73b2e1a03c5f871322c0f98a57d63479166b2db73afebe0d224f1d28e67ef7faa5fb0c2200c2b77e8c927ee392c50d9bc1b678d29e4eb56f3
-
Filesize
33KB
MD5bf369d3d3c8cc8075750055aa464e1d2
SHA19db1ccaad5ce434851422933128cf0d196b0fc86
SHA256958af384da6ceafe936b8f8d2c55dec6fc295a63703ba63ab1fee4446ef0178b
SHA512311b043fca7b01fbb51f960dc036034c91b9ef09a36afed809fcf08292334e4bdc1b706a02bad3abee34d641716546bcea3b8ccbb8aa1c49e1c1b5bf030b10e2
-
Filesize
20KB
MD56de236328476d3c9bf8805bdd195ed5d
SHA1bec1741965261b71f33bcd2c2dbc9fb6425bacc1
SHA256a25b126c41787f2acfe084419d177188e5ab42335047ef0a5539849b7b3da9ad
SHA51298c7a33548f04ba212373e5e7ec05e37d924c705a5e406c29a587973e3a54e528fcb458767568aa2d34f21fb64784ecc50cbc378c2a5224873ce03fa605148ba