Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/02/2024, 17:47
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-14_f331859cce4bd56fc23897b8b1e95a15_cryptolocker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-14_f331859cce4bd56fc23897b8b1e95a15_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-14_f331859cce4bd56fc23897b8b1e95a15_cryptolocker.exe
-
Size
34KB
-
MD5
f331859cce4bd56fc23897b8b1e95a15
-
SHA1
1d08c7ef3735c00b0b7866bbdc259bcb6d84e234
-
SHA256
fada77eb3c4f65294018fa1c0e3b13393a1d99f5b5fe152e541f961c8cbd23a6
-
SHA512
136918033c850379ecc40f275829fad6703296e9126b463cf80f9a178fd6a795f5214c16ce7697b81798485eb59c3b084a1ae4164f73a657c2337deb2202ba59
-
SSDEEP
384:bA74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUgIunexRlSrxVh:bA74zYcgT/Ekd0ryfjPIunYwj
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000a000000012243-13.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2864 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 2076 2024-02-14_f331859cce4bd56fc23897b8b1e95a15_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2864 2076 2024-02-14_f331859cce4bd56fc23897b8b1e95a15_cryptolocker.exe 28 PID 2076 wrote to memory of 2864 2076 2024-02-14_f331859cce4bd56fc23897b8b1e95a15_cryptolocker.exe 28 PID 2076 wrote to memory of 2864 2076 2024-02-14_f331859cce4bd56fc23897b8b1e95a15_cryptolocker.exe 28 PID 2076 wrote to memory of 2864 2076 2024-02-14_f331859cce4bd56fc23897b8b1e95a15_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-14_f331859cce4bd56fc23897b8b1e95a15_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-14_f331859cce4bd56fc23897b8b1e95a15_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5c8567fe154b58bc18960aec091a68d8e
SHA10ff493630cab9006cc7dbc5223374b32c0e8a1e1
SHA2568a4eac334632a5de6e7e8f697f9e4c200c506b56eb27e90502b9c5ebfe3313a5
SHA512ebf49a5da5b97554181d473466dfbf7b7926e83f3a2b7c849b2f37f96c1a4c61916a8e38d45d441e951301b8fd78b150ada8e29070d4db9c19894a5e27c18958