Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 05:53
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-10_95e17bfca3728d54705ed8bd990342fa_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-10_95e17bfca3728d54705ed8bd990342fa_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-10_95e17bfca3728d54705ed8bd990342fa_cryptolocker.exe
-
Size
49KB
-
MD5
95e17bfca3728d54705ed8bd990342fa
-
SHA1
c54fe1a08cce603f0779ddfcc2652559f5924155
-
SHA256
49195767b002bd8a61527e096126eb8b7427676ff716e1cb5c30fe0dfd81e1fe
-
SHA512
741203ba6a3eb12cc0ae75edaa6f888f220cc2d6eeff809d471ddd616f61e2efd5d0575486d20267ff8bd3d9da153b521bf969d35d9511c444d6ddb45ce49b89
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/BtOOtEvwDpjBVaD3E09vaTjpPM:X6QFElP6n+gJBMOtEvwDpjBtECPM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2376 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2556 2024-01-10_95e17bfca3728d54705ed8bd990342fa_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2556 wrote to memory of 2376 2556 2024-01-10_95e17bfca3728d54705ed8bd990342fa_cryptolocker.exe 14 PID 2556 wrote to memory of 2376 2556 2024-01-10_95e17bfca3728d54705ed8bd990342fa_cryptolocker.exe 14 PID 2556 wrote to memory of 2376 2556 2024-01-10_95e17bfca3728d54705ed8bd990342fa_cryptolocker.exe 14 PID 2556 wrote to memory of 2376 2556 2024-01-10_95e17bfca3728d54705ed8bd990342fa_cryptolocker.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"1⤵
- Executes dropped EXE
PID:2376
-
C:\Users\Admin\AppData\Local\Temp\2024-01-10_95e17bfca3728d54705ed8bd990342fa_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-10_95e17bfca3728d54705ed8bd990342fa_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD53910e280c97a54a14ea69b59b196c8a9
SHA1143d5951fe1f813ea30c39c70d3258e3c2da453e
SHA256c128170fabce626f28fdf06445eb1214fc02aaa0018dfe854c4a3e3ce53a480d
SHA51201649370ff223e2cf3496b68a11c5844750d07ac41b2064eb87fc0ec8fe2285096b171e42ca1b48f392f4450d3a8ab63c34baca78c281728c3ec86147a81ed54