Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    2024-08-07_c2be7dc6537418700d312f6b8175c855_bkransomware_karagany

  • Size

    906KB

  • Sample

    240807-pnd8qayeml

  • MD5

    c2be7dc6537418700d312f6b8175c855

  • SHA1

    3d181ec6b208e9f8177e9c9b91faf9769f7b93f3

  • SHA256

    f32577eab95110b79ff52dfa923b8fdfe2aee0cd7cdc73cc383cb666d0bddaf5

  • SHA512

    6d242d244532c817cc8bde9ab5ec50af84c2b374b341c8a1c7e2349d50201c63163aa786567add192f4059e135e9637112c6d40f371a081958294d39afb7c3b7

  • SSDEEP

    24576:f+T4iax8jaE1O4x2h6MIc3IMoqUYE+QYL+uZtU8:mTQWjaE44w6MIc3I87L+uZtb

Malware Config

Targets

    • Target

      2024-08-07_c2be7dc6537418700d312f6b8175c855_bkransomware_karagany

    • Size

      906KB

    • MD5

      c2be7dc6537418700d312f6b8175c855

    • SHA1

      3d181ec6b208e9f8177e9c9b91faf9769f7b93f3

    • SHA256

      f32577eab95110b79ff52dfa923b8fdfe2aee0cd7cdc73cc383cb666d0bddaf5

    • SHA512

      6d242d244532c817cc8bde9ab5ec50af84c2b374b341c8a1c7e2349d50201c63163aa786567add192f4059e135e9637112c6d40f371a081958294d39afb7c3b7

    • SSDEEP

      24576:f+T4iax8jaE1O4x2h6MIc3IMoqUYE+QYL+uZtU8:mTQWjaE44w6MIc3I87L+uZtb

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks