Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 04:36
Behavioral task
behavioral1
Sample
2024-05-29_aa71597e3dbeb4accf35ac989307f8b9_cryptolocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-05-29_aa71597e3dbeb4accf35ac989307f8b9_cryptolocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-29_aa71597e3dbeb4accf35ac989307f8b9_cryptolocker.exe
-
Size
95KB
-
MD5
aa71597e3dbeb4accf35ac989307f8b9
-
SHA1
43e63c09d325ae2cf9c142651b21c2db3cd4391c
-
SHA256
a97c3e527f4fa0465ad13ae5eae6d07be0a6ccc4350cdb9d1f61b850b9f795d9
-
SHA512
95f41ebcdac886b6f34b231f8de887216764b5e862f760a575cd99b02e531db2f0c5b7cd585b2b0cbc899d197513a0abe343c0c56f799e8b8595e4797875c03c
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp0+S:AnBdOOtEvwDpj6z1
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral1/memory/2184-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000d00000001342e-11.dat CryptoLocker_rule2 behavioral1/memory/3052-16-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2184-15-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 behavioral1/memory/3052-26-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 5 IoCs
resource yara_rule behavioral1/memory/2184-0-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/files/0x000d00000001342e-11.dat CryptoLocker_set1 behavioral1/memory/3052-16-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/memory/2184-15-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 behavioral1/memory/3052-26-0x0000000000500000-0x000000000050F000-memory.dmp CryptoLocker_set1 -
UPX dump on OEP (original entry point) 5 IoCs
resource yara_rule behavioral1/memory/2184-0-0x0000000000500000-0x000000000050F000-memory.dmp UPX behavioral1/files/0x000d00000001342e-11.dat UPX behavioral1/memory/3052-16-0x0000000000500000-0x000000000050F000-memory.dmp UPX behavioral1/memory/2184-15-0x0000000000500000-0x000000000050F000-memory.dmp UPX behavioral1/memory/3052-26-0x0000000000500000-0x000000000050F000-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 3052 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2184 2024-05-29_aa71597e3dbeb4accf35ac989307f8b9_cryptolocker.exe -
resource yara_rule behavioral1/memory/2184-0-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/files/0x000d00000001342e-11.dat upx behavioral1/memory/3052-16-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/memory/2184-15-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral1/memory/3052-26-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2184 wrote to memory of 3052 2184 2024-05-29_aa71597e3dbeb4accf35ac989307f8b9_cryptolocker.exe 28 PID 2184 wrote to memory of 3052 2184 2024-05-29_aa71597e3dbeb4accf35ac989307f8b9_cryptolocker.exe 28 PID 2184 wrote to memory of 3052 2184 2024-05-29_aa71597e3dbeb4accf35ac989307f8b9_cryptolocker.exe 28 PID 2184 wrote to memory of 3052 2184 2024-05-29_aa71597e3dbeb4accf35ac989307f8b9_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-29_aa71597e3dbeb4accf35ac989307f8b9_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-29_aa71597e3dbeb4accf35ac989307f8b9_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD598c9ca1e369af5b1cfe0eac14026470d
SHA124b5a64afa895bed33cb9ddae0656e709a1aed1c
SHA256f85e9aaf0cafce339c00a250d458d2ad4e44def0fe6f261708e8cb4da945cdbb
SHA5122fd52c4f0e7d8c438fb9c5a293574332180f60cf76491970deb9f46653746fb603341b7fe183a467bdfae0dd82df78e26d379947ccb3cbe47cb67cb4a3d598c9