Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 06:47
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-08_bda1fe46ca7dd2c4f392ec9bf23e7e23_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-08_bda1fe46ca7dd2c4f392ec9bf23e7e23_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-08_bda1fe46ca7dd2c4f392ec9bf23e7e23_cryptolocker.exe
-
Size
43KB
-
MD5
bda1fe46ca7dd2c4f392ec9bf23e7e23
-
SHA1
e18351429997e7e87d44b48e4d461d74a94f3a1b
-
SHA256
09db4190fd9c556af6c8212803fe06a9ae5b81f18b09c7fe6894cfbe4ce926c2
-
SHA512
812189be79720e6a955937bc8585172ad06f2628eed76a7205495fe0f565e5fd331be389e5190148dd21359e588dd2768cf45e790f5e990a91752a8158f9d452
-
SSDEEP
768:V6LsoEEeegiZPvEhHSG+gDYQtOOtEvwDpj/MLaHaMMm2X3a:V6QFElP6n+gMQMOtEvwDpjyaHaXY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2728 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2512 2024-01-08_bda1fe46ca7dd2c4f392ec9bf23e7e23_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2728 2512 2024-01-08_bda1fe46ca7dd2c4f392ec9bf23e7e23_cryptolocker.exe 16 PID 2512 wrote to memory of 2728 2512 2024-01-08_bda1fe46ca7dd2c4f392ec9bf23e7e23_cryptolocker.exe 16 PID 2512 wrote to memory of 2728 2512 2024-01-08_bda1fe46ca7dd2c4f392ec9bf23e7e23_cryptolocker.exe 16 PID 2512 wrote to memory of 2728 2512 2024-01-08_bda1fe46ca7dd2c4f392ec9bf23e7e23_cryptolocker.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-08_bda1fe46ca7dd2c4f392ec9bf23e7e23_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-08_bda1fe46ca7dd2c4f392ec9bf23e7e23_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD502564db53f8782d2729dcf7eed5ddff9
SHA144a1ee377899029240cee588db7a6e38da041d45
SHA256fece98040c7a3fe46641dc1a6323353a023a51f062e7d717f8a73be4bfc0c89c
SHA512437e09d79e484776083fa150786002544cb523e1b8ad72e3e1cb6bfa16975b0953bbba16508193d51ae59a1486a5136900c66d73b2a0d8d4384dfd77f40c53ce
-
Filesize
13KB
MD5030a293aa3572abd06f0009cb3503d79
SHA14f06a96ded07edc243e6f542d63f92a064a3695e
SHA256a599b4e7ca0080d27c367df014bb57c0a7ac3234c6bd8e60d230c4a296f03d3c
SHA512882582f3a3a272f6e5e6ba663b1759a81c9268ec362853ed0589c9c87b9fb91da995c8c7b583db8916aa4bcb41862448f95655c260ab1871f652664f1163e6fa