Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/03/2024, 10:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-14_0d2f9c176601d5a8e1f9d60b84baa212_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-14_0d2f9c176601d5a8e1f9d60b84baa212_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-14_0d2f9c176601d5a8e1f9d60b84baa212_cryptolocker.exe
-
Size
123KB
-
MD5
0d2f9c176601d5a8e1f9d60b84baa212
-
SHA1
f450523bd7585b6feb615d4dbc5e4749465b9b09
-
SHA256
8ec4b445913de4f4e72b8d686c1692735099e371359245f3fd25bb86941042e8
-
SHA512
4a455bab5dd6088f47328addc18f6ca2b4d0b882e300e83dafc970f0420ca28bea7b16feb8bfa5e6b2df5c7f2c96a4bcf024ed5e4e3b21677a7121c15d65fba8
-
SSDEEP
1536:u6QFElP6n+gWMOtEvwDpjJGYQbN/PKwMgdVG:u6a++OtEvwDpj6zzG
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x00080000000122cd-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x00080000000122cd-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2624 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2128 2024-03-14_0d2f9c176601d5a8e1f9d60b84baa212_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2624 2128 2024-03-14_0d2f9c176601d5a8e1f9d60b84baa212_cryptolocker.exe 28 PID 2128 wrote to memory of 2624 2128 2024-03-14_0d2f9c176601d5a8e1f9d60b84baa212_cryptolocker.exe 28 PID 2128 wrote to memory of 2624 2128 2024-03-14_0d2f9c176601d5a8e1f9d60b84baa212_cryptolocker.exe 28 PID 2128 wrote to memory of 2624 2128 2024-03-14_0d2f9c176601d5a8e1f9d60b84baa212_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-14_0d2f9c176601d5a8e1f9d60b84baa212_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-14_0d2f9c176601d5a8e1f9d60b84baa212_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
123KB
MD517c2450158dcb97ab5307fe1682b026d
SHA1ea21925ba469ae2c7f9dba5aca75dac8e65aee75
SHA256e0fcd344ae94c012201eced199e22096235198b067cb2bc9c1a24b4ddd793ebf
SHA512ea48a07107fd4bef3aa688d73b50fe321496374b3b719c2e196602db30adda5ae048d001f86aead876a50da3c5264caab82f3aa390158536aa00d3618f28ecad