Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 06:36
Behavioral task
behavioral1
Sample
2024-01-08_11849ba642d65bda95848b40eec150a9_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-08_11849ba642d65bda95848b40eec150a9_cryptolocker.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-08_11849ba642d65bda95848b40eec150a9_cryptolocker.exe
-
Size
74KB
-
MD5
11849ba642d65bda95848b40eec150a9
-
SHA1
9ddd3e1a9b1ecb0ac412d777ebf8823b04c6464d
-
SHA256
1eef07c8e76fef902ef53dfc326ce5c0af29982ebac7e8a140cdadae2eb76475
-
SHA512
328fc3e1a3478de2a2be670bf135cb1892c530815e9a25a3d26f79fdd53d80ba3716138acefe94bda5859b8f7a0d1c33c9d31e9dc8de1fa50f78359f0876ffc9
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdl:T6a+rdOOtEvwDpjNtz
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2104 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 3032 2024-01-08_11849ba642d65bda95848b40eec150a9_cryptolocker.exe -
resource yara_rule behavioral1/files/0x000d000000012246-22.dat upx behavioral1/memory/2104-24-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000d000000012246-14.dat upx behavioral1/files/0x000d000000012246-11.dat upx behavioral1/memory/3032-8-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2104 3032 2024-01-08_11849ba642d65bda95848b40eec150a9_cryptolocker.exe 14 PID 3032 wrote to memory of 2104 3032 2024-01-08_11849ba642d65bda95848b40eec150a9_cryptolocker.exe 14 PID 3032 wrote to memory of 2104 3032 2024-01-08_11849ba642d65bda95848b40eec150a9_cryptolocker.exe 14 PID 3032 wrote to memory of 2104 3032 2024-01-08_11849ba642d65bda95848b40eec150a9_cryptolocker.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"1⤵
- Executes dropped EXE
PID:2104
-
C:\Users\Admin\AppData\Local\Temp\2024-01-08_11849ba642d65bda95848b40eec150a9_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-08_11849ba642d65bda95848b40eec150a9_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5af9042937cf81ee8d6defeb25aaa4136
SHA10d8b46a9e4dc8bdb67fa3c0fb8858e4868e68b83
SHA256190139b7704b560f139bafde571a4f0ae30824d946a81c44c91a6b507bde5aed
SHA512cb89c75f0778b30f973e30070ce5b742c21b546871ef4d0b18a8db27dbce3b944856f5b6c8bfc4cf7ec73e41c6119c9a39ed9909075524fd7601b6c368d18604
-
Filesize
48KB
MD5058eb992c4c1254410264319fd2b5960
SHA11eda67ff083c083977be5745dc160aeca55e528c
SHA25611d9df4b48d7060cee3e2646dd58dab987bbe027d95e1c2e6818eb2f0f927cd3
SHA512eb98b41830e8acf4d149d9a39e7f714200a6d6f318d13f0b548d164c5eae0116833f2380589414ca2a4d639f3942700f95f0f4db2db3b17a464c04968e627f81
-
Filesize
10KB
MD510e1c1981ad1c1922fda59a12bea8cb9
SHA1b8b6ed1dc9531e75191abe49effe77eb842fdb31
SHA256f40f58ea85069fe8beacfa443d708149f3c5b2ceb77d262b1e08691a77c7e2e1
SHA51264936a25e49c6265bad212fde8bac307db33702d4920f398b2af08e2b1d19f3f268cb8c9ddff657c47771a2f7a1d61822c5350269e4aa582f533d2435c46c5c3