Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/03/2024, 21:36
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-08_bf0408240f8b88bb06b5823040118fb5_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-08_bf0408240f8b88bb06b5823040118fb5_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-08_bf0408240f8b88bb06b5823040118fb5_cryptolocker.exe
-
Size
35KB
-
MD5
bf0408240f8b88bb06b5823040118fb5
-
SHA1
af9ceb715e18c0add90daacec8a26db6871fc624
-
SHA256
b0723e79f6f96fd36810092e660d876afc308123713e2453cc7f921d988be0de
-
SHA512
1ed4f8614dcb9732a70f456470eea0ede292281fa64e6e0d8f20bab0e6975ed0986af99a3935a7c7480116e2d5bcb29a599861b200bfe387fe59103e0f20d2af
-
SSDEEP
768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoW8t:qmbhXDmjr5MOtEvwDpj5cDvt
Malware Config
Signatures
-
Detection of CryptoLocker Variants 6 IoCs
resource yara_rule behavioral1/memory/2660-1-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000d00000001224c-11.dat CryptoLocker_rule2 behavioral1/memory/2660-13-0x0000000002700000-0x0000000002710000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2648-17-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2660-16-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2648-27-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 4 IoCs
resource yara_rule behavioral1/memory/2660-1-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral1/memory/2648-17-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral1/memory/2660-16-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 behavioral1/memory/2648-27-0x0000000000500000-0x0000000000510000-memory.dmp CryptoLocker_set1 -
UPX dump on OEP (original entry point) 6 IoCs
resource yara_rule behavioral1/memory/2660-1-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral1/files/0x000d00000001224c-11.dat UPX behavioral1/memory/2660-13-0x0000000002700000-0x0000000002710000-memory.dmp UPX behavioral1/memory/2648-17-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral1/memory/2660-16-0x0000000000500000-0x0000000000510000-memory.dmp UPX behavioral1/memory/2648-27-0x0000000000500000-0x0000000000510000-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 2648 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2660 2024-03-08_bf0408240f8b88bb06b5823040118fb5_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2648 2660 2024-03-08_bf0408240f8b88bb06b5823040118fb5_cryptolocker.exe 28 PID 2660 wrote to memory of 2648 2660 2024-03-08_bf0408240f8b88bb06b5823040118fb5_cryptolocker.exe 28 PID 2660 wrote to memory of 2648 2660 2024-03-08_bf0408240f8b88bb06b5823040118fb5_cryptolocker.exe 28 PID 2660 wrote to memory of 2648 2660 2024-03-08_bf0408240f8b88bb06b5823040118fb5_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-08_bf0408240f8b88bb06b5823040118fb5_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-08_bf0408240f8b88bb06b5823040118fb5_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD54a8b097bde5b6a4098b571b6d7f6f21c
SHA1af63c2b3093e1a3cec6cd51b7b36fced24cc0085
SHA2567a097ffcb45062f5f295abef92b4365e990b588a27e38e2db4780514ec4271eb
SHA51285bf30e7d69ad89edd300e5b94cae12f08a1a8162306702beb1295d33d2df88dddd097437364066a27d123e184e52c17816731a6df1b0ee94449a2bb62dd8976