Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/02/2024, 02:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-25_2220829d980abd0ac0e2efcc96e03306_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-25_2220829d980abd0ac0e2efcc96e03306_cryptolocker.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-25_2220829d980abd0ac0e2efcc96e03306_cryptolocker.exe
-
Size
43KB
-
MD5
2220829d980abd0ac0e2efcc96e03306
-
SHA1
b7e945f0b4f49d2f71a78d06f3e8bface7acf59e
-
SHA256
678cb015766ef42bfb1fb94f72dbe5c904aaea1ad99461b92d3447188c202fc8
-
SHA512
c6d65ece8ccaa0d98746358a26f92602bfb2d550c0770227a5399f5589f9ad2f761105d5a3664f716ee77be1caab4469955a7766cc6e35bdf0180e7d5ec06296
-
SSDEEP
768:btB9g/WItCSsAGjX7r3BPOMHocM4vUUOmJ+96eg1lL:btB9g/xtCSKfxLIcMzUw96DL
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x0008000000012265-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2076 gewos.exe -
Loads dropped DLL 1 IoCs
pid Process 3020 2024-02-25_2220829d980abd0ac0e2efcc96e03306_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3020 2024-02-25_2220829d980abd0ac0e2efcc96e03306_cryptolocker.exe 2076 gewos.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2076 3020 2024-02-25_2220829d980abd0ac0e2efcc96e03306_cryptolocker.exe 28 PID 3020 wrote to memory of 2076 3020 2024-02-25_2220829d980abd0ac0e2efcc96e03306_cryptolocker.exe 28 PID 3020 wrote to memory of 2076 3020 2024-02-25_2220829d980abd0ac0e2efcc96e03306_cryptolocker.exe 28 PID 3020 wrote to memory of 2076 3020 2024-02-25_2220829d980abd0ac0e2efcc96e03306_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-25_2220829d980abd0ac0e2efcc96e03306_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-25_2220829d980abd0ac0e2efcc96e03306_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\gewos.exe"C:\Users\Admin\AppData\Local\Temp\gewos.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD5bd5c09f7c2dc540c17b343483cc483f4
SHA107d8d9da799d0bbb903db9f05f47ae31968a49af
SHA25620a3d29a322bb13daf9e908a91ed1e932b3c9e36e828a71e3b34a6b02e6d2e5e
SHA51217811433959f6132810ea8b4e8f066a5a86ed07d9ecd5c128f25fde7e6f8a21b6a93e65fc6ebf9ee6f8395be68f92c0a7ebbeea3e745653b9447249083eedaf1