Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 20:33
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-12_efa2f2729e09e240821c3166247a22d0_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-05-12_efa2f2729e09e240821c3166247a22d0_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-12_efa2f2729e09e240821c3166247a22d0_cryptolocker.exe
-
Size
38KB
-
MD5
efa2f2729e09e240821c3166247a22d0
-
SHA1
f24b2cca64e2d6ae2dae2bb2b4f52bca172ad724
-
SHA256
6a34e822d2d44857de94ca859317ca550bde5ed91c641ae47df3afce5397261b
-
SHA512
35359fa00102bfb9b550ff5a8ea68a565054b18486045c208cb78592e107137c7616d474ef8b734f8b5b1e4f25e550d66d818834594fb375a80b0a832fddcafe
-
SSDEEP
768:bA74zYcgT/Ekd0ryfj86U8zbUYqSFq6pU:bA6YcA/X6GISzRqAU
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000b000000015d0f-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 1992 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 1724 2024-05-12_efa2f2729e09e240821c3166247a22d0_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1992 1724 2024-05-12_efa2f2729e09e240821c3166247a22d0_cryptolocker.exe 28 PID 1724 wrote to memory of 1992 1724 2024-05-12_efa2f2729e09e240821c3166247a22d0_cryptolocker.exe 28 PID 1724 wrote to memory of 1992 1724 2024-05-12_efa2f2729e09e240821c3166247a22d0_cryptolocker.exe 28 PID 1724 wrote to memory of 1992 1724 2024-05-12_efa2f2729e09e240821c3166247a22d0_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-12_efa2f2729e09e240821c3166247a22d0_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-12_efa2f2729e09e240821c3166247a22d0_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:1992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD5b714d8197703f55492f392d0e2e8fcad
SHA18d215bc6496ea85435efd8441dd95bd83be0d0ae
SHA256d16a9b685a98102749b76a1c0763ca438c4cb2d656c62be6436362033dae29aa
SHA512d4e6eac77d45d006f3ed7572ed71d4334c32a553b9ea6ba5d309f145957ac90c4b327b23cbbf859e78c42319fa5ab74c3e8473300206a34b34a58224d54cfa4c