Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/10/2024, 02:20
Behavioral task
behavioral1
Sample
2024-10-15_b092bf331d143a3862e5d943a79e12e2_cryptolocker.exe
Resource
win7-20240903-en
General
-
Target
2024-10-15_b092bf331d143a3862e5d943a79e12e2_cryptolocker.exe
-
Size
47KB
-
MD5
b092bf331d143a3862e5d943a79e12e2
-
SHA1
8e47e5beebd9182aaf7473937b1bcd9907d306d4
-
SHA256
3be47e7b7d1f3386feeb68650ac6287e83b1349d46fd28a3a5d9627e2429caae
-
SHA512
31f2d08bab3c3d47424c93c6280855387c26b8b59ecf85f18db855ac69d773d9754034d37f807443b02da809f2797a22ae7ccb497a9e15251003842e3833c40a
-
SSDEEP
768:bODOw9UiamWUB2preAr+OfjH/0STX73OBqO6iv:bODOw9acifH+Yziv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2664 lossy.exe -
Loads dropped DLL 1 IoCs
pid Process 2668 2024-10-15_b092bf331d143a3862e5d943a79e12e2_cryptolocker.exe -
resource yara_rule behavioral1/memory/2668-0-0x0000000008000000-0x000000000800F000-memory.dmp upx behavioral1/files/0x0007000000012119-11.dat upx behavioral1/memory/2664-16-0x0000000008000000-0x000000000800F000-memory.dmp upx behavioral1/memory/2668-14-0x0000000008000000-0x000000000800F000-memory.dmp upx behavioral1/memory/2664-25-0x0000000008000000-0x000000000800F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-15_b092bf331d143a3862e5d943a79e12e2_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lossy.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2664 2668 2024-10-15_b092bf331d143a3862e5d943a79e12e2_cryptolocker.exe 30 PID 2668 wrote to memory of 2664 2668 2024-10-15_b092bf331d143a3862e5d943a79e12e2_cryptolocker.exe 30 PID 2668 wrote to memory of 2664 2668 2024-10-15_b092bf331d143a3862e5d943a79e12e2_cryptolocker.exe 30 PID 2668 wrote to memory of 2664 2668 2024-10-15_b092bf331d143a3862e5d943a79e12e2_cryptolocker.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-15_b092bf331d143a3862e5d943a79e12e2_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-15_b092bf331d143a3862e5d943a79e12e2_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\lossy.exe"C:\Users\Admin\AppData\Local\Temp\lossy.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD57a474df9f7f4e0013756a3287d5e347f
SHA1a49dd2b89c7faa00ecf2fa3ebb08e11fc8ef017d
SHA2568b52acaa64702e7117f646eb002aff754a6a7180b187d200c2b1d499e3d55a02
SHA512d22786842eb0abe551d330f9ed5b6ae87d715ea5e324019dbbb8bc22bd41be2f5f4c821ce3ec70605aaf57133f1aa94611cd030ef7cc6307d642d2741151c9dd