Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10/10/2024, 16:41
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-10_ceb02bc1aa58dfdddf06d792a118a98f_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-10_ceb02bc1aa58dfdddf06d792a118a98f_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-10_ceb02bc1aa58dfdddf06d792a118a98f_cryptolocker.exe
-
Size
45KB
-
MD5
ceb02bc1aa58dfdddf06d792a118a98f
-
SHA1
6a1105808b9db31c40517c094f9176ae4065604a
-
SHA256
c2768d2bafd6a8b2669dd46303abed7277acde86fab99e49b3dd8978c87f13d0
-
SHA512
c3aa74905cc3382a69ee309b31cdaf72465bdb884e0c814a48f45397af87372c52cd71403e0442d4d37dbaa72a810a95678722ca13e92cb46ae6bc318a22ffeb
-
SSDEEP
768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqPOYRv:6j+1NMOtEvwDpjr8D
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2880 misid.exe -
Loads dropped DLL 1 IoCs
pid Process 2640 2024-10-10_ceb02bc1aa58dfdddf06d792a118a98f_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-10_ceb02bc1aa58dfdddf06d792a118a98f_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2880 2640 2024-10-10_ceb02bc1aa58dfdddf06d792a118a98f_cryptolocker.exe 30 PID 2640 wrote to memory of 2880 2640 2024-10-10_ceb02bc1aa58dfdddf06d792a118a98f_cryptolocker.exe 30 PID 2640 wrote to memory of 2880 2640 2024-10-10_ceb02bc1aa58dfdddf06d792a118a98f_cryptolocker.exe 30 PID 2640 wrote to memory of 2880 2640 2024-10-10_ceb02bc1aa58dfdddf06d792a118a98f_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-10_ceb02bc1aa58dfdddf06d792a118a98f_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-10_ceb02bc1aa58dfdddf06d792a118a98f_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD532e1da6bb9b575afe9c75b8b84cc1949
SHA10b93a556b54aa6f1e3010249ccad7d7cad6daa6c
SHA2566880c1625a6617697472550cfe9f312fbcd5b82389ca56f0fc7a341546e3151e
SHA5126fad616b5544b7a820f3af688f005fcee5ee841160740e6b716f5ed101cfc8a470b007e15f45d610b2be1889ae2b5fc75b330c8b0e533b09f242b113a9bc414e