Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 19:21
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-03_2af463bf281e0453e76e6d1fc1f96899_cryptolocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-03_2af463bf281e0453e76e6d1fc1f96899_cryptolocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-03_2af463bf281e0453e76e6d1fc1f96899_cryptolocker.exe
-
Size
87KB
-
MD5
2af463bf281e0453e76e6d1fc1f96899
-
SHA1
26c26045e015722239d3c634a30f3a6b8940b0be
-
SHA256
30106b3a3f0e30e1110768d83a85c6a142fad10ffa8dea62f3cbf87fb80387bb
-
SHA512
1ce97bbad19a593983ab17b05fe71afcc7dcf61060d0107c60332e32b40e7db45a743527a088f8b1860842afd3d98a8eccf31389eb90c95667bb38c1f324c8ed
-
SSDEEP
1536:vj+jsMQMOtEvwDpj5HwYYTjipvF2hBfWafHNBlQ:vCjsIOtEvwDpj5H9YvQd2O
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral1/files/0x000a000000012286-10.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 1 IoCs
resource yara_rule behavioral1/files/0x000a000000012286-10.dat CryptoLocker_set1 -
Executes dropped EXE 1 IoCs
pid Process 2696 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2244 2024-06-03_2af463bf281e0453e76e6d1fc1f96899_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2696 2244 2024-06-03_2af463bf281e0453e76e6d1fc1f96899_cryptolocker.exe 28 PID 2244 wrote to memory of 2696 2244 2024-06-03_2af463bf281e0453e76e6d1fc1f96899_cryptolocker.exe 28 PID 2244 wrote to memory of 2696 2244 2024-06-03_2af463bf281e0453e76e6d1fc1f96899_cryptolocker.exe 28 PID 2244 wrote to memory of 2696 2244 2024-06-03_2af463bf281e0453e76e6d1fc1f96899_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-03_2af463bf281e0453e76e6d1fc1f96899_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-03_2af463bf281e0453e76e6d1fc1f96899_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD517e5f511d99477ff8866c49463433370
SHA1d6e9b828df06090e368977f004d417b6437d53d4
SHA256ddf2c52429d34c3db7751ee21bff9306565582b12a8217ac3651e0b03f8abf4d
SHA5129b973f1718dd28539b4d04df0c8de6b326062c6303bd21bf4eded8a4cf103fe600c61aeb6853fadf5dae092c709b4122b368266c6f4adbf9a0143479de36c1d7