Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
18/02/2024, 23:10
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-18_c8d3b426e2020fa8a46fba6874ac2e8c_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-18_c8d3b426e2020fa8a46fba6874ac2e8c_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-18_c8d3b426e2020fa8a46fba6874ac2e8c_cryptolocker.exe
-
Size
58KB
-
MD5
c8d3b426e2020fa8a46fba6874ac2e8c
-
SHA1
6f891cd2382287da38144df21aefe3075235c04a
-
SHA256
02d21889edadfacb950d8d99830afdcf5ca11e6553ae1669be22dcf97292d497
-
SHA512
41d11b9e29ee97120529e037c166e1e2795763ccb7e8132ae1c845deeba4423d05b40adb204eda3337176ba69959e1e40c43646aac27b140c521f73a0cb51369
-
SSDEEP
768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjIm8lB4dCOBy/cMFqeoYPO+lxV:ZzFbxmLPWQMOtEvwDpj38lD/cMAT+lj
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000a00000001220d-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2628 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2064 2024-02-18_c8d3b426e2020fa8a46fba6874ac2e8c_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2628 2064 2024-02-18_c8d3b426e2020fa8a46fba6874ac2e8c_cryptolocker.exe 28 PID 2064 wrote to memory of 2628 2064 2024-02-18_c8d3b426e2020fa8a46fba6874ac2e8c_cryptolocker.exe 28 PID 2064 wrote to memory of 2628 2064 2024-02-18_c8d3b426e2020fa8a46fba6874ac2e8c_cryptolocker.exe 28 PID 2064 wrote to memory of 2628 2064 2024-02-18_c8d3b426e2020fa8a46fba6874ac2e8c_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-18_c8d3b426e2020fa8a46fba6874ac2e8c_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-18_c8d3b426e2020fa8a46fba6874ac2e8c_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD58642076ff5adeb8153e52fb17b876c0e
SHA12fdd5a35600978e5094b6cca8f89669b0816ceae
SHA2565b680bd64b656667574baea49307f0e2a33be99df603d2df9cdc130e765b8abf
SHA512a2df11acaea8ad63ea9db4b6cfba421243b8c9c1f58f4011f01d3eb95068676c06d551bd0b50e94a1b4c6f4b40349656aa9bdb3c1b2222a3431ca8ee5a4f16da