Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 06:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-10_220dec99487590c0d93f877abe60aef3_cryptolocker.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-07-10_220dec99487590c0d93f877abe60aef3_cryptolocker.exe
Resource
win10v2004-20240709-en
General
-
Target
2024-07-10_220dec99487590c0d93f877abe60aef3_cryptolocker.exe
-
Size
34KB
-
MD5
220dec99487590c0d93f877abe60aef3
-
SHA1
d724111cc2622a14934c6350d510b8b4c95d3f43
-
SHA256
3e041402edc12998694e59b5d41b1f6d6de9662df3de591e7ea57c65085b5ec7
-
SHA512
156248d755780b743acb185ff15d1a482439c576c9f0ee49625a3b06d61c8183f3e75ee7de3800abb6e9e51b956a333948de17fa2c1db904292fc8562834af0b
-
SSDEEP
384:bG74uGLLQRcsdeQ72ngEr4K7YmE8j60nrlwfjDUGTGXvxh3+:bG74zYcgT/Ekd0ryfjke
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1936 hasfj.exe -
Loads dropped DLL 1 IoCs
pid Process 2232 2024-07-10_220dec99487590c0d93f877abe60aef3_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 1936 2232 2024-07-10_220dec99487590c0d93f877abe60aef3_cryptolocker.exe 28 PID 2232 wrote to memory of 1936 2232 2024-07-10_220dec99487590c0d93f877abe60aef3_cryptolocker.exe 28 PID 2232 wrote to memory of 1936 2232 2024-07-10_220dec99487590c0d93f877abe60aef3_cryptolocker.exe 28 PID 2232 wrote to memory of 1936 2232 2024-07-10_220dec99487590c0d93f877abe60aef3_cryptolocker.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-10_220dec99487590c0d93f877abe60aef3_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-10_220dec99487590c0d93f877abe60aef3_cryptolocker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:1936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5d258531a852e8602b818dc2dd9816da5
SHA1231e5d2b478df7c27e1896d6a3f703ae62dc8e7c
SHA256aa9c49a107aa49c888c5e7f437e48190c188b957b9d71401ddddb6cedeeecff1
SHA5122d3fa3d333bf80a74266962bf2bcb9cdf925a0bf6a48da748cecb5d78c6d4a976e10776919e3f89a12f15dd703db9cd4cac0e35cc67890b4aab0a6817c94fa1b