Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 00:28
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-31_53e3035c28366bc8a3a488a133c48b2a_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-31_53e3035c28366bc8a3a488a133c48b2a_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-05-31_53e3035c28366bc8a3a488a133c48b2a_cryptolocker.exe
-
Size
42KB
-
MD5
53e3035c28366bc8a3a488a133c48b2a
-
SHA1
09b0ad784447d82eced885b8b8d2afc9ef8d24b2
-
SHA256
d7e652f4e22a9f2c90219de2fcb7973add6ece24534f4a043c69ad2e7655961d
-
SHA512
a75a578c3fb7416b258f5a1acd1c6384bba91160b29a722c9aa6460663919637d4d14b7dfc93acbc163bfb3352ea96aa0d0857a082b27dccacb2a3d9033b3924
-
SSDEEP
768:TS5nQJ24LR7tOOtEvwDpjGqPhqlcnvgpnY1n92:m5nkFNMOtEvwDpjG8hgpY192
Malware Config
Signatures
-
Detection of CryptoLocker Variants 5 IoCs
resource yara_rule behavioral1/memory/1984-0-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_rule2 behavioral1/files/0x000c00000001450b-11.dat CryptoLocker_rule2 behavioral1/memory/1984-13-0x0000000001EE0000-0x0000000001EEE000-memory.dmp CryptoLocker_rule2 behavioral1/memory/1984-17-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_rule2 behavioral1/memory/2500-27-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_rule2 -
Detection of Cryptolocker Samples 2 IoCs
resource yara_rule behavioral1/memory/1984-17-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_set1 behavioral1/memory/2500-27-0x0000000000500000-0x000000000050E000-memory.dmp CryptoLocker_set1 -
Detects executables built or packed with MPress PE compressor 5 IoCs
resource yara_rule behavioral1/memory/1984-0-0x0000000000500000-0x000000000050E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x000c00000001450b-11.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/1984-13-0x0000000001EE0000-0x0000000001EEE000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/1984-17-0x0000000000500000-0x000000000050E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2500-27-0x0000000000500000-0x000000000050E000-memory.dmp INDICATOR_EXE_Packed_MPress -
Executes dropped EXE 1 IoCs
pid Process 2500 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1984 2024-05-31_53e3035c28366bc8a3a488a133c48b2a_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2500 1984 2024-05-31_53e3035c28366bc8a3a488a133c48b2a_cryptolocker.exe 28 PID 1984 wrote to memory of 2500 1984 2024-05-31_53e3035c28366bc8a3a488a133c48b2a_cryptolocker.exe 28 PID 1984 wrote to memory of 2500 1984 2024-05-31_53e3035c28366bc8a3a488a133c48b2a_cryptolocker.exe 28 PID 1984 wrote to memory of 2500 1984 2024-05-31_53e3035c28366bc8a3a488a133c48b2a_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-31_53e3035c28366bc8a3a488a133c48b2a_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-31_53e3035c28366bc8a3a488a133c48b2a_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD51ac466775f4d8c05493c2e57797368bc
SHA10110e68692941d60d73c31e651e1a1520144c444
SHA256c4ecb5459a1e229a455ce8e67e1822fa86e4f266bdb4591eb4d3fb0195c0c97f
SHA512b407cbb3c0f2dfc0626d4d44c07a447619fe468942c7651c13b2b36121be5cc1561f96759c594371b5f3d7cb36670c2fcf65cc1764b9f9a8d178ad58cd117c99