Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 03:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-14_a19b39c107f70abd94143adc14f6ee52_cryptolocker.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-10-14_a19b39c107f70abd94143adc14f6ee52_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-14_a19b39c107f70abd94143adc14f6ee52_cryptolocker.exe
-
Size
32KB
-
MD5
a19b39c107f70abd94143adc14f6ee52
-
SHA1
e3e65ff95858ce87c4af9b47f398094cae2388b9
-
SHA256
5091d5d64d8407dd4871274f151d6aa5a8cd0102ef4c7044579a472b8980a34d
-
SHA512
1171f686b1dc21af6fcbbc1892ba473fb840debd3cc55e4c04701a7e4d9565ecaf72b02754ecd847795f5d6701f439809e2f3643970cbd92319b4be7993c591c
-
SSDEEP
384:bAvMaNGh4z7CG3POOvbRSLoF/F0QU5XYFnufc/zzo6cJ3v7c:bAvJCYOOvbRPDEgXRcJo
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2296 demka.exe -
Loads dropped DLL 1 IoCs
pid Process 840 2024-10-14_a19b39c107f70abd94143adc14f6ee52_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-14_a19b39c107f70abd94143adc14f6ee52_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language demka.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 840 2024-10-14_a19b39c107f70abd94143adc14f6ee52_cryptolocker.exe 2296 demka.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 840 wrote to memory of 2296 840 2024-10-14_a19b39c107f70abd94143adc14f6ee52_cryptolocker.exe 29 PID 840 wrote to memory of 2296 840 2024-10-14_a19b39c107f70abd94143adc14f6ee52_cryptolocker.exe 29 PID 840 wrote to memory of 2296 840 2024-10-14_a19b39c107f70abd94143adc14f6ee52_cryptolocker.exe 29 PID 840 wrote to memory of 2296 840 2024-10-14_a19b39c107f70abd94143adc14f6ee52_cryptolocker.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_a19b39c107f70abd94143adc14f6ee52_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-14_a19b39c107f70abd94143adc14f6ee52_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Local\Temp\demka.exe"C:\Users\Admin\AppData\Local\Temp\demka.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5c9be4b66b3bdab77a8ad298bff7474d7
SHA1154215c9445548b1af9036aaa0db7eea66b2876b
SHA256846163581990e9cb88bfb8f9d225a62ff2949b70c4420aafb10c39c89b338064
SHA5123051d899141ff7bbbba79ad24d45e5264be724f5e341258b3a1abb4a43bdf8623a3241291299cca88d7ed97a8e3fc88c42e17e1ced5883bc8ae159ae9b574b8c