Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12/01/2024, 06:08
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-11_faa70bd2194f0a1edf51e46b8b22689a_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-11_faa70bd2194f0a1edf51e46b8b22689a_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-11_faa70bd2194f0a1edf51e46b8b22689a_cryptolocker.exe
-
Size
55KB
-
MD5
faa70bd2194f0a1edf51e46b8b22689a
-
SHA1
8219d2755c42a0d05c20f589f96453be2fd7390f
-
SHA256
323aad4ae3fb75b7323586c54cc221229aefcbcdc13ff1d9b54ac2847dd7d96f
-
SHA512
1affb477c834a818197f46c73f35c7c89ea55426776cdca925ce4aa79378a61461b4e9d124ee7bfd5aded1d0e549b765f39489774337293014f2b20f498c122b
-
SSDEEP
768:xQz7yVEhs9+4uR1bytOOtEvwDpjWfbZgBh8i6g7GoFw9:xj+VGMOtEvwDpjubEgyw9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2168 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2936 2024-01-11_faa70bd2194f0a1edf51e46b8b22689a_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2168 2936 2024-01-11_faa70bd2194f0a1edf51e46b8b22689a_cryptolocker.exe 14 PID 2936 wrote to memory of 2168 2936 2024-01-11_faa70bd2194f0a1edf51e46b8b22689a_cryptolocker.exe 14 PID 2936 wrote to memory of 2168 2936 2024-01-11_faa70bd2194f0a1edf51e46b8b22689a_cryptolocker.exe 14 PID 2936 wrote to memory of 2168 2936 2024-01-11_faa70bd2194f0a1edf51e46b8b22689a_cryptolocker.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-11_faa70bd2194f0a1edf51e46b8b22689a_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-11_faa70bd2194f0a1edf51e46b8b22689a_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5730ad2a408b7b4c38e644bc42b313c7e
SHA1768ba5545b393105a4bff79026023e20b57c6b97
SHA2560dd266e6498c237893423aa8049da70444548fb4ad8ec5d3e8f417c22371ea50
SHA512a50771424ebbfd4d0c155603073f57e4055b0d93e152869543521c91f37ddbf8951e0692a6212ccf4eba132932597253cf30b4822a8222f15b50b617bd27147b