Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 02:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-12_194663fcd1212c5bb83e54f5f70e038b_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-12_194663fcd1212c5bb83e54f5f70e038b_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-12_194663fcd1212c5bb83e54f5f70e038b_cryptolocker.exe
-
Size
62KB
-
MD5
194663fcd1212c5bb83e54f5f70e038b
-
SHA1
ed130102f9077fbedaeaf56e22aa87c4b0ea15ed
-
SHA256
b58148b1f19c77bc38262f2cdf7684046b92b0b928f7b0d62f5648756f723b7b
-
SHA512
d04e99f33aa891e6f356929e1d8218f7594d3883f69df903f125cfe7c6e9a55f3c91c3451c8fb547aaa98bcb10b386415b337a1c437c1da3d847627104ddd465
-
SSDEEP
768:3Uz7yVEhs9+Hs1SQtOOtEvwDpjO9+4hdCY8EQMjpi/Wpi3B3URiLqCyLuAx8XG96:3P+HsMQMOtEvwDpjoHy7B3g9CWuAxW/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2068 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2104 2024-09-12_194663fcd1212c5bb83e54f5f70e038b_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-12_194663fcd1212c5bb83e54f5f70e038b_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2068 2104 2024-09-12_194663fcd1212c5bb83e54f5f70e038b_cryptolocker.exe 30 PID 2104 wrote to memory of 2068 2104 2024-09-12_194663fcd1212c5bb83e54f5f70e038b_cryptolocker.exe 30 PID 2104 wrote to memory of 2068 2104 2024-09-12_194663fcd1212c5bb83e54f5f70e038b_cryptolocker.exe 30 PID 2104 wrote to memory of 2068 2104 2024-09-12_194663fcd1212c5bb83e54f5f70e038b_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-12_194663fcd1212c5bb83e54f5f70e038b_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-12_194663fcd1212c5bb83e54f5f70e038b_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD523559060ff3417716fb94fdee6048cbf
SHA136c98086e4ea9a0e4f3b6433d0861260c828da38
SHA256093c442390ba984a649ac0bb099278bd8132e44df65c358ca1b138b09e21670f
SHA512f81fc265f73bf96013fcf36fd5d8199ec53347f6bf2d365684d583df6cbf5bba9bd88c0812ff9a04972e59904965d191d2b4dac0e6c59a1ee045d887ddcf737a