Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 03:37
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-03_48638d1b7b3340b8e305a1f5a3ca5d3a_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-03_48638d1b7b3340b8e305a1f5a3ca5d3a_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-03_48638d1b7b3340b8e305a1f5a3ca5d3a_cryptolocker.exe
-
Size
78KB
-
MD5
48638d1b7b3340b8e305a1f5a3ca5d3a
-
SHA1
b7d780fc2eb8eb40980f925952633e9ddb62acf3
-
SHA256
a2bc944e3818e500a1d4fcbd213ca7cd6193f04448e6ced538fa344ee0a3edbe
-
SHA512
86b45135e28bb9c8f90250d3b5368b6808b6ac22aacd8cf1846ec9b9a738881c9d1f9c8daee23550c91875c5938e0150a38d4295571854ca1a27ef1d65b476e6
-
SSDEEP
1536:vj+jsMQMOtEvwDpj5HwYYTjipvF2hBfIufXi:vCjsIOtEvwDpj5H9YvQd2u
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x001000000001226b-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x001000000001226b-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2896 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2188 2024-06-03_48638d1b7b3340b8e305a1f5a3ca5d3a_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2896 2188 2024-06-03_48638d1b7b3340b8e305a1f5a3ca5d3a_cryptolocker.exe 28 PID 2188 wrote to memory of 2896 2188 2024-06-03_48638d1b7b3340b8e305a1f5a3ca5d3a_cryptolocker.exe 28 PID 2188 wrote to memory of 2896 2188 2024-06-03_48638d1b7b3340b8e305a1f5a3ca5d3a_cryptolocker.exe 28 PID 2188 wrote to memory of 2896 2188 2024-06-03_48638d1b7b3340b8e305a1f5a3ca5d3a_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-03_48638d1b7b3340b8e305a1f5a3ca5d3a_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-03_48638d1b7b3340b8e305a1f5a3ca5d3a_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD50e545bd8f19108a964fd86ecece88348
SHA1f97aedd2540d4d443a70958687b22a380c61867f
SHA2564afe67f04cc20bc7991a4fc4dd1b0f07cf8c2e13c9487ea0f19bfd6b192da2dd
SHA512b41621cb6bf46839507dbba70f7183bc2a1eb2adee34cc7fdf5d580ac467e2e17f3fac7efe355e55e7a15c12cf1f44fa99d2101ab05d3e20ddafdaf4e3a28a0a