Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    15s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    25/10/2024, 13:29 UTC

General

  • Target

    2024-10-25_42b863e0d684522bbe2f276cad58a160_gandcrab.exe

  • Size

    70KB

  • MD5

    42b863e0d684522bbe2f276cad58a160

  • SHA1

    fb1d9b6080c1c7d99a755df88a436b2519bf95a3

  • SHA256

    d1fab40762ccd0a343d3be3d6fa5a2b4ec3459279c6bfe93019817f0fb6aa144

  • SHA512

    cb8bbb45d7875d326601664ee5dd0a09fc359a070b7f8e7fc3b4815d6b5a938e6149a9d447463d867c7934e1632bc302b983d0d84cae693a8dd5008458da31ee

  • SSDEEP

    1536:ZZZZZZZZZZZZZpXzzzzzzzzzzzzADypczUk+lkZJngWMqqU+2bbbAV2/S2OvvdZl:wd5BJHMqqDL2/Ovvdr

Malware Config

Signatures

  • GandCrab payload 2 IoCs
  • Gandcrab

    Gandcrab is a Trojan horse that encrypts files on a computer.

  • Gandcrab family
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-25_42b863e0d684522bbe2f276cad58a160_gandcrab.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-25_42b863e0d684522bbe2f276cad58a160_gandcrab.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:108

Network

  • flag-us
    DNS
    ipv4bot.whatismyipaddress.com
    2024-10-25_42b863e0d684522bbe2f276cad58a160_gandcrab.exe
    Remote address:
    8.8.8.8:53
    Request
    ipv4bot.whatismyipaddress.com
    IN A
    Response
No results found
  • 8.8.8.8:53
    ipv4bot.whatismyipaddress.com
    dns
    2024-10-25_42b863e0d684522bbe2f276cad58a160_gandcrab.exe
    75 B
    134 B
    1
    1

    DNS Request

    ipv4bot.whatismyipaddress.com

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/108-0-0x000000000FC90000-0x000000000FCA7000-memory.dmp

    Filesize

    92KB

  • memory/108-3-0x000000000FC90000-0x000000000FCA7000-memory.dmp

    Filesize

    92KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.