Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 06:23
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-10_11976b7f388e086fb580a5a3b987724e_cryptolocker.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-07-10_11976b7f388e086fb580a5a3b987724e_cryptolocker.exe
Resource
win10v2004-20240709-en
General
-
Target
2024-07-10_11976b7f388e086fb580a5a3b987724e_cryptolocker.exe
-
Size
50KB
-
MD5
11976b7f388e086fb580a5a3b987724e
-
SHA1
73ccf58172698f1125a1c417fba769e5c802a772
-
SHA256
833413f0d0cc30c811f5c3122727df39ff419dfd4ee28a0ebca88a304e315186
-
SHA512
6a3c80aea3d2e7b359f0671b43e0e9afaf2a4e9a046fdabb0df163f0602ddd6493ad79248caf372c00599243fc294f8b861c4156098a3f2fe4f3bc48ad63120f
-
SSDEEP
768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4/Uth8igNrr42A7n0FmB0nn:vj+jsMQMOtEvwDpj5HczerLO04B0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2068 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1820 2024-07-10_11976b7f388e086fb580a5a3b987724e_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1820 wrote to memory of 2068 1820 2024-07-10_11976b7f388e086fb580a5a3b987724e_cryptolocker.exe 30 PID 1820 wrote to memory of 2068 1820 2024-07-10_11976b7f388e086fb580a5a3b987724e_cryptolocker.exe 30 PID 1820 wrote to memory of 2068 1820 2024-07-10_11976b7f388e086fb580a5a3b987724e_cryptolocker.exe 30 PID 1820 wrote to memory of 2068 1820 2024-07-10_11976b7f388e086fb580a5a3b987724e_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-10_11976b7f388e086fb580a5a3b987724e_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-10_11976b7f388e086fb580a5a3b987724e_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD53f3c1c340c938e0ad77f25ee4ce3a270
SHA1a9b60e388f64d20323dccea4ef04feab78294362
SHA2568196f59404585ba3b273e0e8e10882f9c3b0c18115e86b73019a9cffe0f5abba
SHA51225c0c27ac5d952a41f780f1e9796b46a5e3993cf5cd7d2f5fafe44774c8e75af232d71590206ea619d3085b8efcdaa8241cdf6ba67c979e134968ab21ed17406