Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 07:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-24_c42e9dd8dff21b121be1154a752a87d5_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-24_c42e9dd8dff21b121be1154a752a87d5_cryptolocker.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-24_c42e9dd8dff21b121be1154a752a87d5_cryptolocker.exe
-
Size
60KB
-
MD5
c42e9dd8dff21b121be1154a752a87d5
-
SHA1
a79d54c989fa0cadcb370ecb188b0e1383352e92
-
SHA256
058fab59765393335f646f701c1ed8eee1b37085b69f0bdda99b44cc62f9e44b
-
SHA512
c163f99ba3cf96c0a12cff752c982effd6fde2ed2da777ec8fe19e5cf285d25cdbc94ec6fa2978515a792e6fa219c03b81ef09eb4db65e2348fcf5da0b812689
-
SSDEEP
1536:Tj+jsMQMOtEvwDpj5HmpJpOUHECgNMo0vp2EMP6:TCjsIOtEvwDpj5HE/OUHnSMJ
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral1/memory/1876-0-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000a000000012255-11.dat CryptoLocker_rule2 behavioral1/memory/1876-15-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2132-16-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2132-25-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 5 IoCs
resource yara_rule behavioral1/memory/1876-0-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_set1 behavioral1/files/0x000a000000012255-11.dat CryptoLocker_set1 behavioral1/memory/1876-15-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_set1 behavioral1/memory/2132-16-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_set1 behavioral1/memory/2132-25-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2132 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1876 2024-01-24_c42e9dd8dff21b121be1154a752a87d5_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1876 wrote to memory of 2132 1876 2024-01-24_c42e9dd8dff21b121be1154a752a87d5_cryptolocker.exe 28 PID 1876 wrote to memory of 2132 1876 2024-01-24_c42e9dd8dff21b121be1154a752a87d5_cryptolocker.exe 28 PID 1876 wrote to memory of 2132 1876 2024-01-24_c42e9dd8dff21b121be1154a752a87d5_cryptolocker.exe 28 PID 1876 wrote to memory of 2132 1876 2024-01-24_c42e9dd8dff21b121be1154a752a87d5_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-24_c42e9dd8dff21b121be1154a752a87d5_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-24_c42e9dd8dff21b121be1154a752a87d5_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5f6fa754258ccd12cd202987458648d34
SHA1bd7660fcd2e5c0de20f1726c847850d2e6feb82b
SHA256e812193675ed91bd72fa84e50d3956ac55dffe8e7b0803874daa40bdfc79d776
SHA512a9839b87eec70cab0029c24ad3a331216de702cc556a7d361b09a6d81e047d1c8824e46d99b2f41f0d342341f5642eb7dfb4c7638ee27404dc32f42099ac0d6d