Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
129s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 20:49
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-17_cd7d80f4e47d8c398d8c5d3ffa23f750_cryptolocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-17_cd7d80f4e47d8c398d8c5d3ffa23f750_cryptolocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-17_cd7d80f4e47d8c398d8c5d3ffa23f750_cryptolocker.exe
-
Size
50KB
-
MD5
cd7d80f4e47d8c398d8c5d3ffa23f750
-
SHA1
bd7ff4d1db4bd5fe7fc930e2830a9e0e617af3e5
-
SHA256
d6723cef66a6b0b7fafd30912ddfd1e988c93578d13a65e62e3bb79951069f20
-
SHA512
62bb07ba3f3d7dea83d59e61e24f2f2556e5f4b67e3f71669d8c40c5acb7826f274d6512d123649c02c16c6cd5467c843d428de51029e592c8d1862f0c9ffdab
-
SSDEEP
768:bIDOw9UiaCHfjnE0Sfa7ilR0p9u6p4ICNBCXK9K:bIDOw9a0DwitDZzd
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2336 lossy.exe -
Loads dropped DLL 1 IoCs
pid Process 1624 2024-10-17_cd7d80f4e47d8c398d8c5d3ffa23f750_cryptolocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-17_cd7d80f4e47d8c398d8c5d3ffa23f750_cryptolocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lossy.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1624 wrote to memory of 2336 1624 2024-10-17_cd7d80f4e47d8c398d8c5d3ffa23f750_cryptolocker.exe 31 PID 1624 wrote to memory of 2336 1624 2024-10-17_cd7d80f4e47d8c398d8c5d3ffa23f750_cryptolocker.exe 31 PID 1624 wrote to memory of 2336 1624 2024-10-17_cd7d80f4e47d8c398d8c5d3ffa23f750_cryptolocker.exe 31 PID 1624 wrote to memory of 2336 1624 2024-10-17_cd7d80f4e47d8c398d8c5d3ffa23f750_cryptolocker.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-17_cd7d80f4e47d8c398d8c5d3ffa23f750_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-17_cd7d80f4e47d8c398d8c5d3ffa23f750_cryptolocker.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\lossy.exe"C:\Users\Admin\AppData\Local\Temp\lossy.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD5eaf5b5bde775c10029f7dd2dd652c9d0
SHA108b125d0bdc338ddf137b7a809454def58dbc376
SHA256be7ebe6a7db069c964626bb0dd8c84e20775e773000ad2141b05a063332b644c
SHA5125591f484109265fbe2d5690ac8881aa37b2f321a464c0191cddf2b8123e8479c3715ed1804729cff6743e258828d2319d4293ee073bac4808b8075c90f886259