Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/04/2024, 08:56
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-11_d825ee1f5ff96a0ae17360ceff1035f7_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-11_d825ee1f5ff96a0ae17360ceff1035f7_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-11_d825ee1f5ff96a0ae17360ceff1035f7_cryptolocker.exe
-
Size
106KB
-
MD5
d825ee1f5ff96a0ae17360ceff1035f7
-
SHA1
03a2e66a67b600723bd93bb2743fcc6f298baa2f
-
SHA256
a0d9d0fc5288597e3cf64673dc53d6577f6056b2f822c1324931b509ec9c8654
-
SHA512
53df2835c126a963fbce4048b82c3f90b603d329ecc0a0f6cc9f58db443d6ee5bb1e0fcd9e12bc58bd0c1781d6d72917c0632fd0a89047ef8747f0699643dbe6
-
SSDEEP
1536:V6QFElP6n+gMQMOtEvwDpjQGYQbN/PKwNgpQbCJh5:V6a+pOtEvwDpjtzw
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000b000000012256-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000b000000012256-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2340 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2224 2024-04-11_d825ee1f5ff96a0ae17360ceff1035f7_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2340 2224 2024-04-11_d825ee1f5ff96a0ae17360ceff1035f7_cryptolocker.exe 28 PID 2224 wrote to memory of 2340 2224 2024-04-11_d825ee1f5ff96a0ae17360ceff1035f7_cryptolocker.exe 28 PID 2224 wrote to memory of 2340 2224 2024-04-11_d825ee1f5ff96a0ae17360ceff1035f7_cryptolocker.exe 28 PID 2224 wrote to memory of 2340 2224 2024-04-11_d825ee1f5ff96a0ae17360ceff1035f7_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d825ee1f5ff96a0ae17360ceff1035f7_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-11_d825ee1f5ff96a0ae17360ceff1035f7_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD5ff4e3c271794482429ed938a348fbf86
SHA101a6010a1d69c36d9d272b2f08922f231033fb25
SHA25643a43216dd21bc9f2ae150f44bd988d036d5cfd30c1f524c3b9287d498de33a6
SHA512639d5cf4aaaaf48285c3ab4be1c0bf6389c92268e6c037e1cccfb2a9442ba77fe62713432f246cb858942a12ab2e77fa31d78e4d91b658faf610af3c44127b8c