Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 06:47
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-08_c5dae3e2c76f56060f6d640ae2f8120d_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-08_c5dae3e2c76f56060f6d640ae2f8120d_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-08_c5dae3e2c76f56060f6d640ae2f8120d_cryptolocker.exe
-
Size
43KB
-
MD5
c5dae3e2c76f56060f6d640ae2f8120d
-
SHA1
04b90d8f9902991d3d18a03c5580ea69e65ce6ce
-
SHA256
5d2685aad54e089c312ae31c0cc4eec0f5f6da77c5f8b2e236a2a7bc90f99cf5
-
SHA512
646c450cc108337e4c0661a536fa6718898dc9d752e8651c6287652658c13abc7c171de9560e2130f1c9b19555ed1193573eda29d6f6a5eed7af59df3177c056
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBaaEqbIu55N:X6QFElP6n+gJQMOtEvwDpjB0GIWN
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2720 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2168 2024-01-08_c5dae3e2c76f56060f6d640ae2f8120d_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2720 2168 2024-01-08_c5dae3e2c76f56060f6d640ae2f8120d_cryptolocker.exe 16 PID 2168 wrote to memory of 2720 2168 2024-01-08_c5dae3e2c76f56060f6d640ae2f8120d_cryptolocker.exe 16 PID 2168 wrote to memory of 2720 2168 2024-01-08_c5dae3e2c76f56060f6d640ae2f8120d_cryptolocker.exe 16 PID 2168 wrote to memory of 2720 2168 2024-01-08_c5dae3e2c76f56060f6d640ae2f8120d_cryptolocker.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-08_c5dae3e2c76f56060f6d640ae2f8120d_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-08_c5dae3e2c76f56060f6d640ae2f8120d_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5b87889a496af543e1c1d45b2896f4d51
SHA1c94acc3f096f619a4d66100c69690dadc44f7998
SHA256e66b22bfb699b22e3604b83f9ab368dc367dd0660a44d20999891ff5f01472d5
SHA5126a15875ce10f1d0c88bb67f5dc5e5e39c3249aa94ef991426f4020b8afbe0f150212633d05bdd6b169f2bbd74392991585fe0ed269d8cd34a6ba50770498d6a1
-
Filesize
18KB
MD5a82134c71accd057df90a2b9e890b9af
SHA1c8b066a77c696a24825e8520f46b0747aeaa79a9
SHA2560d23dcfa0cebf2251d31cd347a648ecab9042b401f087f878c456f0f19b2e104
SHA512861b76a0157d54c7bddcd33e5559b16173ff5ceff6ebf2f3fab02df8eecdd6a658f63cbe9fe6aae83e81e8307d2b0f6f23f236800da9ab0c79fa7bfd4cd1c423
-
Filesize
9KB
MD597e877608c6514cf5ccb09c81218b429
SHA10b48cddd603a05302c7dbcbd21a90fc184eca66c
SHA25616a4fdb3b121b5fb7665d97a590735bbe6b60be2b99f7971f5fd6d03ea73c134
SHA512793b76cf05b475e173d62dd76a154c4851bced0de0b8c69f12a2fcb0559a6d66ef6aa376cb93fe983ed85e37cb679b159c99ba7bb9cbd28a3e28b29447190dd2