Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
23/02/2024, 19:39
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-23_501e7e7777ecf9f6cd622d5dbde027bd_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-02-23_501e7e7777ecf9f6cd622d5dbde027bd_cryptolocker.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-23_501e7e7777ecf9f6cd622d5dbde027bd_cryptolocker.exe
-
Size
36KB
-
MD5
501e7e7777ecf9f6cd622d5dbde027bd
-
SHA1
a7a0086c4a572604617f8612c08691cd351d9116
-
SHA256
5f8705c195554fda0d26cf33e1a382eb1c82231c935006ca87f120d959ac0059
-
SHA512
7cfdc67ef40171f3c7dda106966d00a91aab3eb88b750d1271d88f657aba2686310ae8fbce799e861674d39d13d93310d3f2b721c83e5c249fcb09f5b056e54b
-
SSDEEP
384:btBYQg/WIEhUCSNyepEjYnDOAlzVol6U/zzo+tkq4XDIwNiJXxXunKUj:btB9g/WItCSsAGjX7e9N0hunKUj
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000c00000001231a-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2692 gewos.exe -
Loads dropped DLL 1 IoCs
pid Process 2328 2024-02-23_501e7e7777ecf9f6cd622d5dbde027bd_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2328 2024-02-23_501e7e7777ecf9f6cd622d5dbde027bd_cryptolocker.exe 2692 gewos.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2692 2328 2024-02-23_501e7e7777ecf9f6cd622d5dbde027bd_cryptolocker.exe 28 PID 2328 wrote to memory of 2692 2328 2024-02-23_501e7e7777ecf9f6cd622d5dbde027bd_cryptolocker.exe 28 PID 2328 wrote to memory of 2692 2328 2024-02-23_501e7e7777ecf9f6cd622d5dbde027bd_cryptolocker.exe 28 PID 2328 wrote to memory of 2692 2328 2024-02-23_501e7e7777ecf9f6cd622d5dbde027bd_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-23_501e7e7777ecf9f6cd622d5dbde027bd_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-23_501e7e7777ecf9f6cd622d5dbde027bd_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\gewos.exe"C:\Users\Admin\AppData\Local\Temp\gewos.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5223f0c719e98b9452992ae681318120d
SHA11db44c28ef076bc2206218bd15c1934313b95fb3
SHA2561412105d29f73603cea0738aa35e1121bbc2aeca2035b48b724a10c0dc350be6
SHA51212fa2a2978cefbadebbd4afe08ceafdbe9a866d40f7d5593f579bd6fab487c26aa5940597aa9b4ecab66551bb26467bdb910d3e6c763a20ca23722d8a454629b