Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 17:34
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-17_c9558172db378b1e8e27de438a706cfe_cryptolocker.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-10-17_c9558172db378b1e8e27de438a706cfe_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-17_c9558172db378b1e8e27de438a706cfe_cryptolocker.exe
-
Size
65KB
-
MD5
c9558172db378b1e8e27de438a706cfe
-
SHA1
6d549669dd769f673f2316f169da977b7e2cabbd
-
SHA256
0fb07937e54ce5ae9cce046a333819f5b6f2ad08bb23536899ca395f1e0f6e55
-
SHA512
1d6d687f07ba99c8e8a83d8244da75f63d34faee8739b33081c553d50ae009001e047e346a6fd9617510db0ebfd0b55bee3a12b27eba070d6ef59de72f5d12e9
-
SSDEEP
1536:Dk/xY0sllyGQMOtEvwDpjwycDtKkQZQRKb61vSbgZ3QzNKJ6:DW60sllyWOtEvwDpjwF85N
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1700 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2260 2024-10-17_c9558172db378b1e8e27de438a706cfe_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-17_c9558172db378b1e8e27de438a706cfe_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2260 wrote to memory of 1700 2260 2024-10-17_c9558172db378b1e8e27de438a706cfe_cryptolocker.exe 31 PID 2260 wrote to memory of 1700 2260 2024-10-17_c9558172db378b1e8e27de438a706cfe_cryptolocker.exe 31 PID 2260 wrote to memory of 1700 2260 2024-10-17_c9558172db378b1e8e27de438a706cfe_cryptolocker.exe 31 PID 2260 wrote to memory of 1700 2260 2024-10-17_c9558172db378b1e8e27de438a706cfe_cryptolocker.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-17_c9558172db378b1e8e27de438a706cfe_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-17_c9558172db378b1e8e27de438a706cfe_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD55234d31c0616207b895807f5fbbbd59f
SHA11cea145594e81fa7e397a7f96085b8759a885cc3
SHA2562235c1f6d03fdedd25487a73c1cc5a296f40f086ee975147c61b8a82ab77fcf0
SHA5123e6d5443dff49dea844b49c354b6f0a4d874930ff6405f05f813ed3fe4a9baea61a0b7f34d7b18c54a6d4f3425ce4178740a36af227924a38f0e766fe740a9a3