Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 04:34
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-24_827ae8032c19bf90c50c65a1d0e185a7_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-05-24_827ae8032c19bf90c50c65a1d0e185a7_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-24_827ae8032c19bf90c50c65a1d0e185a7_cryptolocker.exe
-
Size
55KB
-
MD5
827ae8032c19bf90c50c65a1d0e185a7
-
SHA1
7c94ca316e9306c9392a2bcd07429ccbca3337aa
-
SHA256
074fd9e989e210d7eeee80bf9340f1120a4c732aef05d605d69c60b0de823506
-
SHA512
ad70d1f5127ec240accefa68cc5bdc6073faf6ba388a448d30441209d6d8cd71e3800877eb3c362b6a0a093852454fbc04d9658e22cfb476fc5a9d9ef3ff29c0
-
SSDEEP
1536:ZzFbxmLPWQMOtEvwDpj386Sj/WprgJN6tZdO5UjO:ZVxkGOtEvwDpjcT
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x0009000000016a29-10.dat CryptoLocker_rule2 -
Executes dropped EXE 1 IoCs
pid Process 3044 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2344 2024-05-24_827ae8032c19bf90c50c65a1d0e185a7_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2344 wrote to memory of 3044 2344 2024-05-24_827ae8032c19bf90c50c65a1d0e185a7_cryptolocker.exe 28 PID 2344 wrote to memory of 3044 2344 2024-05-24_827ae8032c19bf90c50c65a1d0e185a7_cryptolocker.exe 28 PID 2344 wrote to memory of 3044 2344 2024-05-24_827ae8032c19bf90c50c65a1d0e185a7_cryptolocker.exe 28 PID 2344 wrote to memory of 3044 2344 2024-05-24_827ae8032c19bf90c50c65a1d0e185a7_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_827ae8032c19bf90c50c65a1d0e185a7_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-24_827ae8032c19bf90c50c65a1d0e185a7_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD536e963f192d3889facc62cce85860175
SHA16e40130ff1d4bb5facee1510cdc999493a4d5bdd
SHA256b34a8c63dbfb251568d2c88ae9ab0e6fdceeb93e97fc88f6d438c196240a1d10
SHA51215a6efb77dfca3260fa7c1593eecb53fd621380812f4a91d12b3f0235a24afd4129960b0b07b0e41acf792c32f3d23c8d4e3c2d1d5fc92d59f895d3e1416267c