Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/03/2024, 06:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-08_cb701e33e12552b1f4eefdcf13067bfa_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-08_cb701e33e12552b1f4eefdcf13067bfa_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-08_cb701e33e12552b1f4eefdcf13067bfa_cryptolocker.exe
-
Size
41KB
-
MD5
cb701e33e12552b1f4eefdcf13067bfa
-
SHA1
bdfcfd919bf15566ad46f65302c2bd6d2aca3c5e
-
SHA256
9cdb795d8fcc874c772e1ac4d1de912c7a9013cc7f47090e65944f1687ff4422
-
SHA512
c4f7580133f0cdb5c0b050bc2bd89ab453ca846347b7baf9402195bf9a902ab120ebfa0ee6c5d58d511e728cbfda0d5be6e5023d72385129002299de7bbf5178
-
SSDEEP
768:wHGGaSawqnwjRQ6ESlmFOsPoOdQtOOtEvwDpjm6j4AYsqSh+DETkedqs:YGzl5wjRQBBOsP1QMOtEvwDpjl39+D+x
Malware Config
Signatures
-
Detection of CryptoLocker Variants 4 IoCs
resource yara_rule behavioral1/memory/2956-0-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000d0000000133a4-11.dat CryptoLocker_rule2 behavioral1/memory/2956-14-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2188-16-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 4 IoCs
resource yara_rule behavioral1/memory/2956-0-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 behavioral1/files/0x000d0000000133a4-11.dat CryptoLocker_set1 behavioral1/memory/2956-14-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 behavioral1/memory/2188-16-0x0000000000500000-0x000000000050B000-memory.dmp CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2188 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2956 2024-03-08_cb701e33e12552b1f4eefdcf13067bfa_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2188 2956 2024-03-08_cb701e33e12552b1f4eefdcf13067bfa_cryptolocker.exe 28 PID 2956 wrote to memory of 2188 2956 2024-03-08_cb701e33e12552b1f4eefdcf13067bfa_cryptolocker.exe 28 PID 2956 wrote to memory of 2188 2956 2024-03-08_cb701e33e12552b1f4eefdcf13067bfa_cryptolocker.exe 28 PID 2956 wrote to memory of 2188 2956 2024-03-08_cb701e33e12552b1f4eefdcf13067bfa_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-08_cb701e33e12552b1f4eefdcf13067bfa_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-08_cb701e33e12552b1f4eefdcf13067bfa_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD54f4f002686c336dde305f4612a806acb
SHA146b9874c8a30103e0cbadc7a947591f956935255
SHA2569855ddf3bd92a0ab1788113b7d1de7f9710fd2aade353b59f90f4bd2a08a8d8a
SHA512a3d356923825531b18702580db3d7b901e0bf5d3a055a3e208586b47f05ebc86065f7ab9add443be5c30201b8bb6ea9cc28bf879c1063378218bcf2893b08a58