Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
125s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/01/2025, 20:51
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-12_f87353370bad1dffce4a957381b5e457_bkransomware_emotet_karagany.exe
Resource
win7-20240903-en
General
-
Target
2025-01-12_f87353370bad1dffce4a957381b5e457_bkransomware_emotet_karagany.exe
-
Size
117KB
-
MD5
f87353370bad1dffce4a957381b5e457
-
SHA1
b23121db02e99d83648ade87d081715f6d98f86e
-
SHA256
9c0dade5b83b03cb769e523b89e66c7b2cd192afe014be0b8cc4ca024185e71a
-
SHA512
9c0d8a05e7a488866c58575069b19e5f7cd69803eaf3062ccdf1f3d25a9d57b0d904ec4c8617aefc962f3e6fa369e6d930fd093cbe37ad7ace1c930cd60f6c77
-
SSDEEP
1536:IdSLQcdYvt3eBHFSpTAvNwUbuEpovMc8LPDznsWjcdTgD17gl:kSjup4NRbuEpoyLP3IUD17U
Malware Config
Signatures
-
Emotet family
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HumanRipple.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HumanRipple.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-12_f87353370bad1dffce4a957381b5e457_bkransomware_emotet_karagany.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3048 HumanRipple.exe 3048 HumanRipple.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1548 2025-01-12_f87353370bad1dffce4a957381b5e457_bkransomware_emotet_karagany.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1548 wrote to memory of 2316 1548 2025-01-12_f87353370bad1dffce4a957381b5e457_bkransomware_emotet_karagany.exe 31 PID 1548 wrote to memory of 2316 1548 2025-01-12_f87353370bad1dffce4a957381b5e457_bkransomware_emotet_karagany.exe 31 PID 1548 wrote to memory of 2316 1548 2025-01-12_f87353370bad1dffce4a957381b5e457_bkransomware_emotet_karagany.exe 31 PID 1548 wrote to memory of 2316 1548 2025-01-12_f87353370bad1dffce4a957381b5e457_bkransomware_emotet_karagany.exe 31 PID 2316 wrote to memory of 3048 2316 HumanRipple.exe 32 PID 2316 wrote to memory of 3048 2316 HumanRipple.exe 32 PID 2316 wrote to memory of 3048 2316 HumanRipple.exe 32 PID 2316 wrote to memory of 3048 2316 HumanRipple.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-12_f87353370bad1dffce4a957381b5e457_bkransomware_emotet_karagany.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-12_f87353370bad1dffce4a957381b5e457_bkransomware_emotet_karagany.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\HumanRipple.exe"C:\Windows\SysWOW64\HumanRipple.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\HumanRipple.exe"C:\Windows\SysWOW64\HumanRipple.exe" -f76e15a3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3048
-
-