Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/04/2024, 00:23
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-28_066ecb3cfc9b34f38c48a69c7c174dab_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-28_066ecb3cfc9b34f38c48a69c7c174dab_cryptolocker.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-04-28_066ecb3cfc9b34f38c48a69c7c174dab_cryptolocker.exe
-
Size
42KB
-
MD5
066ecb3cfc9b34f38c48a69c7c174dab
-
SHA1
6bcfdd6080c4806ae798ab15c7187f34abd83fd3
-
SHA256
81731f3081068517bfa106cf905026c096c4654f1f4a857ec645f3e33337e8c3
-
SHA512
46a7f7fda975717d770eb1583dc87672fa2b91ea922d088f21146ecf28341e0fd23dfd9148039190a64290fa76a4473bf7699df488e490ef3e095419113fd694
-
SSDEEP
768:bCDOw9UiaKHfjnD0S16avdrQFiLjJvtAHS:bCDOw9aMDooc+vAy
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral1/memory/1132-0-0x0000000008000000-0x000000000800A000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000c0000000144e4-11.dat CryptoLocker_rule2 behavioral1/memory/1132-15-0x0000000008000000-0x000000000800A000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2840-16-0x0000000008000000-0x000000000800A000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2840-26-0x0000000008000000-0x000000000800A000-memory.dmp CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 2840 lossy.exe -
Loads dropped DLL 1 IoCs
pid Process 1132 2024-04-28_066ecb3cfc9b34f38c48a69c7c174dab_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1132 wrote to memory of 2840 1132 2024-04-28_066ecb3cfc9b34f38c48a69c7c174dab_cryptolocker.exe 28 PID 1132 wrote to memory of 2840 1132 2024-04-28_066ecb3cfc9b34f38c48a69c7c174dab_cryptolocker.exe 28 PID 1132 wrote to memory of 2840 1132 2024-04-28_066ecb3cfc9b34f38c48a69c7c174dab_cryptolocker.exe 28 PID 1132 wrote to memory of 2840 1132 2024-04-28_066ecb3cfc9b34f38c48a69c7c174dab_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_066ecb3cfc9b34f38c48a69c7c174dab_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-28_066ecb3cfc9b34f38c48a69c7c174dab_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\lossy.exe"C:\Users\Admin\AppData\Local\Temp\lossy.exe"2⤵
- Executes dropped EXE
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD584c0c5e543d6bf6cb8814a148a6b8320
SHA140f5e7173b3d339f9e00a18e32bb5d9bc9428d40
SHA256bee3b845a8a533a37983762f6f4e8528a94ca65d1e85081cfa82f84cd067c557
SHA5124517e3ad41a7aa19f62ccae1ae6a2232003798194707d341daf6947d6c85ad3d3f7184ea1660c81c4ee234915af2865b9254e523d343b020bcdd2b7e02486912