Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 15:37
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-08_1e42565b26ac8fc46514da160186e31b_cryptolocker.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
2024-04-08_1e42565b26ac8fc46514da160186e31b_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-08_1e42565b26ac8fc46514da160186e31b_cryptolocker.exe
-
Size
42KB
-
MD5
1e42565b26ac8fc46514da160186e31b
-
SHA1
919be4aa17ac96423435971d70789a78917429fd
-
SHA256
42133e09911b566d50ea8aab7ce6e8dcfb75db03f648be5fdaa5068bddf0e9b8
-
SHA512
fa34983d400b340d056a14e50b69435bef7ed6a04ca073a719b871f46545871bae86d790889fb8e2dfe5bed745854e5a2a26f035f15483feeae73b2a1aa40409
-
SSDEEP
768:b7o/2n1TCraU6GD1a4X0WcO+wMVm+slAMphqB:bc/y2lkF0+BeqB
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000c0000000121ea-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2152 rewok.exe -
Loads dropped DLL 1 IoCs
pid Process 2072 2024-04-08_1e42565b26ac8fc46514da160186e31b_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2072 2024-04-08_1e42565b26ac8fc46514da160186e31b_cryptolocker.exe 2152 rewok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2152 2072 2024-04-08_1e42565b26ac8fc46514da160186e31b_cryptolocker.exe 28 PID 2072 wrote to memory of 2152 2072 2024-04-08_1e42565b26ac8fc46514da160186e31b_cryptolocker.exe 28 PID 2072 wrote to memory of 2152 2072 2024-04-08_1e42565b26ac8fc46514da160186e31b_cryptolocker.exe 28 PID 2072 wrote to memory of 2152 2072 2024-04-08_1e42565b26ac8fc46514da160186e31b_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-08_1e42565b26ac8fc46514da160186e31b_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-08_1e42565b26ac8fc46514da160186e31b_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\rewok.exe"C:\Users\Admin\AppData\Local\Temp\rewok.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD505a37b660ff5d3dfe3a83094d845a65b
SHA1a31c177eb5493c6bae0d1e26f7d8196682258126
SHA2568f178f116cc350af0394c8971e84f51e873e639be1ce54c6a18a8dac205a392e
SHA512d68df0846581c2341c532596bc322d47087df0189a4097ea74fd30d639ee7012b82283228115cb487b5d0676472a940da7c65cadd98e50aa43abccb820182647