Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 10:00
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-15_999e52cdab682ca05c2ad35d26e46d71_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-15_999e52cdab682ca05c2ad35d26e46d71_cryptolocker.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-15_999e52cdab682ca05c2ad35d26e46d71_cryptolocker.exe
-
Size
389KB
-
MD5
999e52cdab682ca05c2ad35d26e46d71
-
SHA1
58ebcb00578dab32e938126aeffefa5a278d83b0
-
SHA256
67f47c66eb6b9996621450311c55a1d8a478831d87f3691919d3da30983b5d55
-
SHA512
6be4d00729ecc7c2a1b7561847d81a9338c96c8f2e1ee3371ecdb2e5a8e328e72f4b8b0b10a4b7cb3122d1b06fc82951bb2a1c393cdf87d95114d2c9f5cb7589
-
SSDEEP
6144:nnOsaQgAOjvrZFODJjBz3j1jTqQy6v2GGnugOtihzXd:nnOflT/ZFIjBz3xjTxynGUOUhXd
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000c00000001234b-13.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2968 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 1956 2024-04-15_999e52cdab682ca05c2ad35d26e46d71_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2968 1956 2024-04-15_999e52cdab682ca05c2ad35d26e46d71_cryptolocker.exe 28 PID 1956 wrote to memory of 2968 1956 2024-04-15_999e52cdab682ca05c2ad35d26e46d71_cryptolocker.exe 28 PID 1956 wrote to memory of 2968 1956 2024-04-15_999e52cdab682ca05c2ad35d26e46d71_cryptolocker.exe 28 PID 1956 wrote to memory of 2968 1956 2024-04-15_999e52cdab682ca05c2ad35d26e46d71_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_999e52cdab682ca05c2ad35d26e46d71_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-15_999e52cdab682ca05c2ad35d26e46d71_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
389KB
MD5a34af336785b6b66d649cf88b2e4b959
SHA1b236a5cde8937b63681f773fd70e5be2a0cbc196
SHA256b5a82c626022540b242ae60e5cbd51033ccbb6df845d3393074126bba97a38bc
SHA51211304a0a2e5c46a450f377cc043a5b4c3e37c7c816b794270a8014fd19a018b19163db4ba849c3f835d1e2f4261341f4c405a3ae4b8e9d8bd3fa3c79287d9ef4