Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/03/2024, 22:30
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-13_72b519ab098e70017c188169acbe894f_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-13_72b519ab098e70017c188169acbe894f_cryptolocker.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-03-13_72b519ab098e70017c188169acbe894f_cryptolocker.exe
-
Size
54KB
-
MD5
72b519ab098e70017c188169acbe894f
-
SHA1
298a47f4bfab664e9394443f59799a76555ee1b1
-
SHA256
3aaba015decb18ab3e4d2ee90d29aae4b9d9cf36b8a649a2f1436f237ade9697
-
SHA512
8aaab1fe7d04d3afb0268c2e9d9e8c35e12482807e308c621bccb130076d2898f1c163c3fa08dc604c1ecea80e2bda1792e178304b429442e55cba4c2430c12e
-
SSDEEP
768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4hdCW1nw71TkhsiPn1YFv6dlE:vj+jsMQMOtEvwDpj5HH1nw73KOFiE
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000a000000012255-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000a000000012255-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2952 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2312 2024-03-13_72b519ab098e70017c188169acbe894f_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2952 2312 2024-03-13_72b519ab098e70017c188169acbe894f_cryptolocker.exe 28 PID 2312 wrote to memory of 2952 2312 2024-03-13_72b519ab098e70017c188169acbe894f_cryptolocker.exe 28 PID 2312 wrote to memory of 2952 2312 2024-03-13_72b519ab098e70017c188169acbe894f_cryptolocker.exe 28 PID 2312 wrote to memory of 2952 2312 2024-03-13_72b519ab098e70017c188169acbe894f_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-13_72b519ab098e70017c188169acbe894f_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-13_72b519ab098e70017c188169acbe894f_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD55d2b266ae1760a0fb2c3d564ee17fff4
SHA14a82f18b8a8df625cdc30f82c63e14433741d62e
SHA2569c7a24f9e1bb258fc5cfdad8da5eb1847b1b05f85dcb4d215dba4f940ecb4189
SHA51239424054bd8ff31bbd64ae50b6c529c1851d6d48e9a9948573c85cc18f43585217bdaba09b04cff7189c5383edbf495e8ac19e19855d832008baa2821e2584d5