Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/03/2024, 12:45
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-16_87b9661ad42da8eb0b2fcda473f007b7_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-16_87b9661ad42da8eb0b2fcda473f007b7_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-16_87b9661ad42da8eb0b2fcda473f007b7_cryptolocker.exe
-
Size
61KB
-
MD5
87b9661ad42da8eb0b2fcda473f007b7
-
SHA1
58fcb9f030698e1a89d4f32fb1ba5e3414b6bd77
-
SHA256
63e42ff7330bb7d3827d176836b538bd1d2fd4dbd4155526b7bf352e060a4eab
-
SHA512
9a551aba3549aaa1b077f727fa54714e6ebec23f9eff78a55d449daee63f6bbb4768ec113f4ff268474edc62687ac90be39240710e32f3b5b5816a9424692ec6
-
SSDEEP
1536:Tj+jsMQMOtEvwDpj5HmpJpOUHECgNMo0vp2EMXbs:TCjsIOtEvwDpj5HE/OUHnSMX
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral1/memory/1948-0-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000b00000001224f-11.dat CryptoLocker_rule2 behavioral1/memory/1948-15-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2148-16-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2148-26-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 5 IoCs
resource yara_rule behavioral1/memory/1948-0-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_set1 behavioral1/files/0x000b00000001224f-11.dat CryptoLocker_set1 behavioral1/memory/1948-15-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_set1 behavioral1/memory/2148-16-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_set1 behavioral1/memory/2148-26-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2148 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1948 2024-03-16_87b9661ad42da8eb0b2fcda473f007b7_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2148 1948 2024-03-16_87b9661ad42da8eb0b2fcda473f007b7_cryptolocker.exe 28 PID 1948 wrote to memory of 2148 1948 2024-03-16_87b9661ad42da8eb0b2fcda473f007b7_cryptolocker.exe 28 PID 1948 wrote to memory of 2148 1948 2024-03-16_87b9661ad42da8eb0b2fcda473f007b7_cryptolocker.exe 28 PID 1948 wrote to memory of 2148 1948 2024-03-16_87b9661ad42da8eb0b2fcda473f007b7_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-16_87b9661ad42da8eb0b2fcda473f007b7_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-16_87b9661ad42da8eb0b2fcda473f007b7_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5a27e46a4adb359f9e2f0bc3f37fade85
SHA15c2d50407ae51a1d0f3fd9b8e10db4fd502ce104
SHA2566a7440ee96b366d64fe48f31dd6fd3baada1662e227f5ac46d5d92211f9b022a
SHA512ff1ad11f07bf8c27732016032ce6396355b577b711cb39dde92a9d139b49c49d1df0340b7c0d85db0eb7dba363d02b12f98702b1400ac5fe890a68c109e9175d