Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 18:15
Static task
static1
Behavioral task
behavioral1
Sample
20240521f25127a141e0295e9be57a728d453ed0cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
20240521f25127a141e0295e9be57a728d453ed0cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
20240521f25127a141e0295e9be57a728d453ed0cryptolocker.exe
-
Size
37KB
-
MD5
f25127a141e0295e9be57a728d453ed0
-
SHA1
8a1ea4a652a54c3d17fee1be34fe25d1d5377fc4
-
SHA256
5c97497acc6bb9181a68186626ad5cd5b5d6e938d24f71eea6b608b852fcdc7e
-
SHA512
06589e30f57f1cfed7c0c7d916af20ac5f3acf018dbcd490785c08263e654be2f5e75dc2a2395f708ed2972943e5d24ae9e8bad227219a767a08b0b50bd7e753
-
SSDEEP
768:fTz7y3lhsT+hs1SQtOOtEvwDpjfAu9+4k:fT+hsMQMOtEvwDpjoIHk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2252 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2168 20240521f25127a141e0295e9be57a728d453ed0cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2252 2168 20240521f25127a141e0295e9be57a728d453ed0cryptolocker.exe 28 PID 2168 wrote to memory of 2252 2168 20240521f25127a141e0295e9be57a728d453ed0cryptolocker.exe 28 PID 2168 wrote to memory of 2252 2168 20240521f25127a141e0295e9be57a728d453ed0cryptolocker.exe 28 PID 2168 wrote to memory of 2252 2168 20240521f25127a141e0295e9be57a728d453ed0cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\20240521f25127a141e0295e9be57a728d453ed0cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\20240521f25127a141e0295e9be57a728d453ed0cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5f1e6d5220b3278636f183ba8b97311da
SHA119affb6659a15ad1d6ebed557cfe8d15a888e0a2
SHA25658318a2bc60f4c310916d7713fb492f9ff4a29224b05c201f5c31d87f0b07d2b
SHA512233170daffa2137a0be38de500b53b5944a4bfb6af0180839a09de02db56e99b5ed7421f1f6c8ca018bb3f0649d0934b640ebf8c52811bc7564037be871657ca