Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 04:08
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-25_c96f0ce69b92a64a417cee13352db579_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-05-25_c96f0ce69b92a64a417cee13352db579_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-25_c96f0ce69b92a64a417cee13352db579_cryptolocker.exe
-
Size
67KB
-
MD5
c96f0ce69b92a64a417cee13352db579
-
SHA1
a2bc17f5dcc2ed89e26997a36391ebdc7f18a9d1
-
SHA256
27d1521b481a697c2c48557f887a78d73304655833b8f2e9931ed17fdd5cb466
-
SHA512
96c5f0fadaf72bb5da46dc34d959709f2835463ed27dd0677b92a507514e4b47f24da6631be0ca5a9edf42d3db8634162ae032a683630239c860ef27c2ad1093
-
SSDEEP
1536:Tj+jsMQMOtEvwDpj5HmpJpOUHECgNMo0vp2l9tMPvdfGyB:TCjsIOtEvwDpj5HE/OUHnSMYG
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral1/memory/2064-1-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2064-14-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000d000000015d59-15.dat CryptoLocker_rule2 behavioral1/memory/3048-16-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_rule2 behavioral1/memory/3048-26-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 5 IoCs
resource yara_rule behavioral1/memory/2064-1-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_set1 behavioral1/memory/2064-14-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_set1 behavioral1/files/0x000d000000015d59-15.dat CryptoLocker_set1 behavioral1/memory/3048-16-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_set1 behavioral1/memory/3048-26-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 3048 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2064 2024-05-25_c96f0ce69b92a64a417cee13352db579_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2064 wrote to memory of 3048 2064 2024-05-25_c96f0ce69b92a64a417cee13352db579_cryptolocker.exe 28 PID 2064 wrote to memory of 3048 2064 2024-05-25_c96f0ce69b92a64a417cee13352db579_cryptolocker.exe 28 PID 2064 wrote to memory of 3048 2064 2024-05-25_c96f0ce69b92a64a417cee13352db579_cryptolocker.exe 28 PID 2064 wrote to memory of 3048 2064 2024-05-25_c96f0ce69b92a64a417cee13352db579_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_c96f0ce69b92a64a417cee13352db579_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-25_c96f0ce69b92a64a417cee13352db579_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:3048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5bfdac6e8bd7c5838e6468a672d2440db
SHA10597c722b39925dfeea8a8278d981fea8be23744
SHA2563f9a5e2a2d5b4f0de1e9e4614529f761e454cdd79ecf61b8426363a0bec99c7c
SHA5128dd9d7017c80abeb0068184b2b4784a73083826d0b7572afb12bd10f0aa18ae01e150b67b571be27cb5f2d67e6431b1cbdac7c6f52f99aa03e96045b15fdf284