Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/10/2024, 03:03
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-06_f584415aa1358558788489e68f26cacf_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-06_f584415aa1358558788489e68f26cacf_cryptolocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-06_f584415aa1358558788489e68f26cacf_cryptolocker.exe
-
Size
48KB
-
MD5
f584415aa1358558788489e68f26cacf
-
SHA1
e31a4ea2e9999806b6f11333eb8fd938c4370c04
-
SHA256
4d190c9e78b15c8eeda36d6312d170f0433d14b6f8e09c3a537250aea2a488aa
-
SHA512
b6bc69786a7cf3ae4f7cee0c06ee15aee9767d28451e07820e6e77cc5531979c158f884875e503f4132f255dbcd278e105548315d775c0f9af101a61d8186625
-
SSDEEP
768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqh6/aMDhkJ0:6j+1NMOtEvwDpjrRraJ0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1908 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 1972 2024-10-06_f584415aa1358558788489e68f26cacf_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-06_f584415aa1358558788489e68f26cacf_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1972 wrote to memory of 1908 1972 2024-10-06_f584415aa1358558788489e68f26cacf_cryptolocker.exe 29 PID 1972 wrote to memory of 1908 1972 2024-10-06_f584415aa1358558788489e68f26cacf_cryptolocker.exe 29 PID 1972 wrote to memory of 1908 1972 2024-10-06_f584415aa1358558788489e68f26cacf_cryptolocker.exe 29 PID 1972 wrote to memory of 1908 1972 2024-10-06_f584415aa1358558788489e68f26cacf_cryptolocker.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-06_f584415aa1358558788489e68f26cacf_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-06_f584415aa1358558788489e68f26cacf_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD51bff37c6473936a534670951e06e43e0
SHA1263bb9731122e5697df503b5daa3d0e966e271c9
SHA2566471c697a10b2907dd68d511c9b1ac851550a0541dafe4f174aaa48795e36c7b
SHA5121ac83dff797a89e67fcd859e0bbdd1b2cb0c7066e2187fbb48e81a86b2e200533da04b289cc4d3e1707e337062968d4dceb9f0a264e11c4a9b7c5adde37832c3