Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/02/2024, 09:48
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-25_a3e19957ed2f4f9e2b9acd19d6b7cd1e_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-25_a3e19957ed2f4f9e2b9acd19d6b7cd1e_cryptolocker.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-25_a3e19957ed2f4f9e2b9acd19d6b7cd1e_cryptolocker.exe
-
Size
41KB
-
MD5
a3e19957ed2f4f9e2b9acd19d6b7cd1e
-
SHA1
6a7dd2b1b554aa1540b3f9154f66200c681f41f4
-
SHA256
d3db9ab2d831df3dba5a35de2d13eb6735027ad3277746c2468f30f63bf9706c
-
SHA512
a6d0e7ea27ed42a896e2ed65275207824dbfcf4099e8b3f34a2f6b661fe08ba5e652dcf245cbd47c3734ae78471fa5032e208f14dc0cf119f5d07b79235c8727
-
SSDEEP
768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqh6n8E:6j+1NMOtEvwDpjrR8E
Malware Config
Signatures
-
Detection of CryptoLocker Variants 6 IoCs
resource yara_rule behavioral1/memory/2384-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000c000000012328-11.dat CryptoLocker_rule2 behavioral1/memory/2384-15-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2964-17-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2384-14-0x0000000002740000-0x000000000274F000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2964-27-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 6 IoCs
resource yara_rule behavioral1/memory/2384-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/files/0x000c000000012328-11.dat CryptoLocker_set1 behavioral1/memory/2384-15-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/memory/2964-17-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/memory/2384-14-0x0000000002740000-0x000000000274F000-memory.dmp CryptoLocker_set1 behavioral1/memory/2964-27-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 -
Detects executables built or packed with MPress PE compressor 6 IoCs
resource yara_rule behavioral1/memory/2384-0-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x000c000000012328-11.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/2384-15-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2964-17-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2384-14-0x0000000002740000-0x000000000274F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2964-27-0x0000000000500000-0x000000000050F000-memory.dmp INDICATOR_EXE_Packed_MPress -
Executes dropped EXE 1 IoCs
pid Process 2964 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2384 2024-02-25_a3e19957ed2f4f9e2b9acd19d6b7cd1e_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2964 2384 2024-02-25_a3e19957ed2f4f9e2b9acd19d6b7cd1e_cryptolocker.exe 28 PID 2384 wrote to memory of 2964 2384 2024-02-25_a3e19957ed2f4f9e2b9acd19d6b7cd1e_cryptolocker.exe 28 PID 2384 wrote to memory of 2964 2384 2024-02-25_a3e19957ed2f4f9e2b9acd19d6b7cd1e_cryptolocker.exe 28 PID 2384 wrote to memory of 2964 2384 2024-02-25_a3e19957ed2f4f9e2b9acd19d6b7cd1e_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-25_a3e19957ed2f4f9e2b9acd19d6b7cd1e_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-25_a3e19957ed2f4f9e2b9acd19d6b7cd1e_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5dc7903af500883e64b978d66a520c039
SHA1bf8c523ec018e6a8b08b590cdfeb32215db4c575
SHA2568efa28259ee5f73a8cce46906c4fadb51535773afd9a20d5b322271d205612ce
SHA5129779c550d9d2a637265d99d8a189807f15ac6a072e0aef3682cc43a811f26346f0b61c7c57507ac311b6645aaafc704c4dd3581ed91185d1503444c280ecb6aa