Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 14:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-12_d4c6d5c5825ee20a1173ffc99272e0d5_cryptolocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-05-12_d4c6d5c5825ee20a1173ffc99272e0d5_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-12_d4c6d5c5825ee20a1173ffc99272e0d5_cryptolocker.exe
-
Size
73KB
-
MD5
d4c6d5c5825ee20a1173ffc99272e0d5
-
SHA1
55df809ab9f73f333da975d278df6de627d11231
-
SHA256
ad69cd37ddff507f08082a1cbf982c4a1c34e226505bd3bc1599c2c18e326993
-
SHA512
d0a1e3db6a79d01ab78a5d43e4e4e52379578a76aa5bb4e84356afd0d41e155ffe1498efa1c8d21a977967356ef101d455085703c099bfa458f3495fb9046186
-
SSDEEP
768:u6LsoEEeegiZPvEhHSG+gZgtOOtEvwDpjeY10Y/YMss:u6QFElP6n+gWMOtEvwDpjJGYQbs
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000d000000014323-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000d000000014323-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2756 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2392 2024-05-12_d4c6d5c5825ee20a1173ffc99272e0d5_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2756 2392 2024-05-12_d4c6d5c5825ee20a1173ffc99272e0d5_cryptolocker.exe 28 PID 2392 wrote to memory of 2756 2392 2024-05-12_d4c6d5c5825ee20a1173ffc99272e0d5_cryptolocker.exe 28 PID 2392 wrote to memory of 2756 2392 2024-05-12_d4c6d5c5825ee20a1173ffc99272e0d5_cryptolocker.exe 28 PID 2392 wrote to memory of 2756 2392 2024-05-12_d4c6d5c5825ee20a1173ffc99272e0d5_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-12_d4c6d5c5825ee20a1173ffc99272e0d5_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-12_d4c6d5c5825ee20a1173ffc99272e0d5_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5952173ba5badaaaf6592fbb0ee50ec0f
SHA184903d9b9d507ae0d002b96d8264c944d9414875
SHA2561832ed9b81ec84bb6bf9d023899061c6ee13cd6b51d5261e90541c0f59c04add
SHA512fa6e917e08b71d0be2d4da045b331e77a91506f6bd4788faa807a9b3d4217ead07ed3e3a571a5aa00bfe07308719016d8808768bae06ff2ef2cc21576fe1c06d