Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 09:23
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-09_5cf62fe707503ca3d2548ccd180f7aa0_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-09_5cf62fe707503ca3d2548ccd180f7aa0_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-09_5cf62fe707503ca3d2548ccd180f7aa0_cryptolocker.exe
-
Size
60KB
-
MD5
5cf62fe707503ca3d2548ccd180f7aa0
-
SHA1
aa4830a974886aa6242f129f8c2b8cbfb7229a77
-
SHA256
83d174b8e61792ebf45f7b530f86c7e0b04da27c03dcfd44352624d2d461bd71
-
SHA512
a6e5d2e1f5892fc3da5668af8e3b111d00581676691ee67657f204a484875441be9b0096b7e4a44d274d598993bb8c009d67ba6920c8a34675016b962720c5b2
-
SSDEEP
1536:btB9g/xtCSKfxLIc//Xr+/AO/kIZ3ft2nVuTKB6nggOlHdUHZp:btng54SMLr+/AO/kIhfoKMHdap
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000900000001227e-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2512 gewos.exe -
Loads dropped DLL 1 IoCs
pid Process 1948 2024-04-09_5cf62fe707503ca3d2548ccd180f7aa0_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1948 2024-04-09_5cf62fe707503ca3d2548ccd180f7aa0_cryptolocker.exe 2512 gewos.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2512 1948 2024-04-09_5cf62fe707503ca3d2548ccd180f7aa0_cryptolocker.exe 28 PID 1948 wrote to memory of 2512 1948 2024-04-09_5cf62fe707503ca3d2548ccd180f7aa0_cryptolocker.exe 28 PID 1948 wrote to memory of 2512 1948 2024-04-09_5cf62fe707503ca3d2548ccd180f7aa0_cryptolocker.exe 28 PID 1948 wrote to memory of 2512 1948 2024-04-09_5cf62fe707503ca3d2548ccd180f7aa0_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-09_5cf62fe707503ca3d2548ccd180f7aa0_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-09_5cf62fe707503ca3d2548ccd180f7aa0_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\gewos.exe"C:\Users\Admin\AppData\Local\Temp\gewos.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5acf515a97aacd64a271508c1a93af02f
SHA1d836f739dba290c2fc8d4c8bcbfda4a4a37bb51d
SHA25603c30dd83ac37c01a093501289c51d3f521addceaaaf6a677d1f8d911a5cdb6b
SHA51209a3cb3f52159a1728391165b5d508c0d747e7b3c438b364225a10d9299ed2115f691c2eee8516eadeca8cb801060c43c776d189d75fa8b3aa09ebe335217aef