Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/01/2025, 12:30
Behavioral task
behavioral1
Sample
2025-01-18_c5da62dd7ad7ff340049aa55569870ff_bkransomware_gandcrab_karagany.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-18_c5da62dd7ad7ff340049aa55569870ff_bkransomware_gandcrab_karagany.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-01-18_c5da62dd7ad7ff340049aa55569870ff_bkransomware_gandcrab_karagany.exe
-
Size
141KB
-
MD5
c5da62dd7ad7ff340049aa55569870ff
-
SHA1
34c505180208c625702b7959449772202c0b3954
-
SHA256
14932d46c4a8beaef3c0ac9f438f0ae126f9f0fdc80a68628c5261b9df5d50a0
-
SHA512
c71b6ad43ec76b91bc065d4bedd5e493979c90b9795dcbd766cc712f7e50736c46cd4ce01b17212de60022976483d1b760a26203d0b80ee6fe09880664b05b93
-
SSDEEP
3072:m5tmM+mMqQHiUs4QL1nMqqDL2/OPvdl5:m5t3dj4QL1MqqDL6svdl5
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2744 2448 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-18_c5da62dd7ad7ff340049aa55569870ff_bkransomware_gandcrab_karagany.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2448 wrote to memory of 2744 2448 2025-01-18_c5da62dd7ad7ff340049aa55569870ff_bkransomware_gandcrab_karagany.exe 30 PID 2448 wrote to memory of 2744 2448 2025-01-18_c5da62dd7ad7ff340049aa55569870ff_bkransomware_gandcrab_karagany.exe 30 PID 2448 wrote to memory of 2744 2448 2025-01-18_c5da62dd7ad7ff340049aa55569870ff_bkransomware_gandcrab_karagany.exe 30 PID 2448 wrote to memory of 2744 2448 2025-01-18_c5da62dd7ad7ff340049aa55569870ff_bkransomware_gandcrab_karagany.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-18_c5da62dd7ad7ff340049aa55569870ff_bkransomware_gandcrab_karagany.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-18_c5da62dd7ad7ff340049aa55569870ff_bkransomware_gandcrab_karagany.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2448 -s 362⤵
- Program crash
PID:2744
-