Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 09:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-13_6e5678d25de60a6f71153d190f015a88_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-13_6e5678d25de60a6f71153d190f015a88_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-13_6e5678d25de60a6f71153d190f015a88_cryptolocker.exe
-
Size
51KB
-
MD5
6e5678d25de60a6f71153d190f015a88
-
SHA1
03ff18070e6fa6587f738d50b795450b186b710c
-
SHA256
9b1861400ad1de3effc2bd12659bae8df2936bb6fa22823525394c40521cd6ef
-
SHA512
ae97596eef9d571f762f85a8394cf65093cf5d676251ad086192e8e3ec63e28b22672d7e88d7e8a1d0694c93aa87ba98e9bae52041dd6129622e1e48063b740e
-
SSDEEP
768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4/Uth8igNrr42A7n0FmB0nQ:vj+jsMQMOtEvwDpj5HczerLO04BL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2052 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1976 2024-09-13_6e5678d25de60a6f71153d190f015a88_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-13_6e5678d25de60a6f71153d190f015a88_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2052 1976 2024-09-13_6e5678d25de60a6f71153d190f015a88_cryptolocker.exe 29 PID 1976 wrote to memory of 2052 1976 2024-09-13_6e5678d25de60a6f71153d190f015a88_cryptolocker.exe 29 PID 1976 wrote to memory of 2052 1976 2024-09-13_6e5678d25de60a6f71153d190f015a88_cryptolocker.exe 29 PID 1976 wrote to memory of 2052 1976 2024-09-13_6e5678d25de60a6f71153d190f015a88_cryptolocker.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_6e5678d25de60a6f71153d190f015a88_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-13_6e5678d25de60a6f71153d190f015a88_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD546adb954035b6078392b52e6792d4aee
SHA1594522088b616ac9c237de59aaa3aa0597e607b8
SHA2566c6718a444752d1ce4be705b2aa2ec1e38e33bcc8b929dbb80384dfaf5842b5c
SHA5124895b773fe6656553899eb28be9eefad35e7940b3d6d094930b5d3412090a372ff3e20b316c61400a862caeaf78a551bfab72815bc9ea1a19521de96403586bd