Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 22:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-09_bbd6744cd9a5bbba69cdc4deb79f8335_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-09_bbd6744cd9a5bbba69cdc4deb79f8335_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-09_bbd6744cd9a5bbba69cdc4deb79f8335_cryptolocker.exe
-
Size
48KB
-
MD5
bbd6744cd9a5bbba69cdc4deb79f8335
-
SHA1
3763bcbce9a306b144a8c55d7e36661a98664d7d
-
SHA256
bd8bf93d69532f6875045f7094852256195dbdc5aa98da5e5b3bec206f30071a
-
SHA512
8a92dded2d2a38789b90a5a1f7592e2a6362ca9689b069a0cd79ab2db49a1808292b65ce2aba7ae017d40aa5dae49e9dfcb913f1ab8a0a752045a05dd7ef1d8b
-
SSDEEP
768:P6LsoEEeegiZPvEhHS5+Mh/QtOOtEvwDpjBpaD3TUogs/VXpAPlAC:P6QFElP6k+MRQMOtEvwDpjBQpVX8AC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2292 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 3020 2024-09-09_bbd6744cd9a5bbba69cdc4deb79f8335_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-09_bbd6744cd9a5bbba69cdc4deb79f8335_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2292 3020 2024-09-09_bbd6744cd9a5bbba69cdc4deb79f8335_cryptolocker.exe 30 PID 3020 wrote to memory of 2292 3020 2024-09-09_bbd6744cd9a5bbba69cdc4deb79f8335_cryptolocker.exe 30 PID 3020 wrote to memory of 2292 3020 2024-09-09_bbd6744cd9a5bbba69cdc4deb79f8335_cryptolocker.exe 30 PID 3020 wrote to memory of 2292 3020 2024-09-09_bbd6744cd9a5bbba69cdc4deb79f8335_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-09_bbd6744cd9a5bbba69cdc4deb79f8335_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-09_bbd6744cd9a5bbba69cdc4deb79f8335_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD58b1c5ddc27a033b09422ad4d106fbe61
SHA13ccb96ac959457fbcb6360c8a98459931f995602
SHA256aa8b4a8161e97162a75d336691dc48ff3e036f7e620cfd3e1197499f9aeae838
SHA512e05d956b90bd4fa0937fba854723434ce325eb3b0f8e71e05881fd53d40d69a600cb6e53843325097584a040b53113a199e23e7254bb3a92f2b4b7e3a11d9cdd