Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/03/2024, 17:48
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-05_f23664ba2ac4877acfe2864827d7dd51_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-05_f23664ba2ac4877acfe2864827d7dd51_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-05_f23664ba2ac4877acfe2864827d7dd51_cryptolocker.exe
-
Size
47KB
-
MD5
f23664ba2ac4877acfe2864827d7dd51
-
SHA1
f8f3bf5e10141e4a73f8314871435c4079ab8b12
-
SHA256
8417545a231a67fcb45d72a9a954542d771141600858596f7993cbe2005c618a
-
SHA512
a8b1ef6fef5646f1259d15e53b94746216af83d642cb64ff01db71c91b89cd246c546b8298e571250bbb35c48fd44a07060ec5986e4af9977581aa57a5c05e81
-
SSDEEP
768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjIm8z2iaSIO/WZrEu/d+qmsUHQ1wsU:ZzFbxmLPWQMOtEvwDpj386Sj/WprqQ1m
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000d000000012248-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2796 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 856 2024-03-05_f23664ba2ac4877acfe2864827d7dd51_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 856 wrote to memory of 2796 856 2024-03-05_f23664ba2ac4877acfe2864827d7dd51_cryptolocker.exe 28 PID 856 wrote to memory of 2796 856 2024-03-05_f23664ba2ac4877acfe2864827d7dd51_cryptolocker.exe 28 PID 856 wrote to memory of 2796 856 2024-03-05_f23664ba2ac4877acfe2864827d7dd51_cryptolocker.exe 28 PID 856 wrote to memory of 2796 856 2024-03-05_f23664ba2ac4877acfe2864827d7dd51_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_f23664ba2ac4877acfe2864827d7dd51_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-05_f23664ba2ac4877acfe2864827d7dd51_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD5ad0a3f293a8e8e8314586398cc9f3b4c
SHA1528d5dfe0be8658bcb99687be7c7b63e38212aa5
SHA25664881d178b3b15a5f19e7fb8799b0129403c1a36eebfdecb1a5906908a8df715
SHA512921c242bb0a0ebc0ab3b96909df416f6ed05f3aba211ff2d2284331fd5687a515988a865373a37bd1a1ed2a138d76460b243b59b4b9d99a807e9c262c81f4734