Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
21079256090.zip
-
Size
319KB
-
Sample
250203-kkm91awmhx
-
MD5
713ef833abefc1316d7b14bd7a31a377
-
SHA1
f27a3e506d1f071c1517fa03050ecf355006b1ef
-
SHA256
078db298573943f3a52a21706f1a5e0bea2a577bd886eef754ae15fb72fe3557
-
SHA512
681a7119a3d734fff89fb5d102a5c913aba9e57b3264156529a8c53d332db4ccfbba856cdedf1e57c75a12b48b09fc89c000c6a8417ff69f85d986ea9edcbccc
-
SSDEEP
6144:M20UNWg36YNdvdTCYkuSW0xBJhQ705RIEmDJYc85DX:MPKdrjvdeYkuKjD115j
Static task
static1
Behavioral task
behavioral1
Sample
3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral2
Sample
3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe
Resource
win10ltsc2021-20250128-en
Behavioral task
behavioral3
Sample
3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da
-
Size
624KB
-
MD5
a6980e543efa40771ed1dcf84b29d732
-
SHA1
6586b2155afa5d7cda5cd3f8a7af37c4fe126a1d
-
SHA256
3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da
-
SHA512
d1ca8724c8879442907b7e45b59b954100ada37e036aa17496920a9783eb0738ff51831854acc8cafd805c116bfea47a903270fec74949f10b36eddf971ac06f
-
SSDEEP
12288:/ktG6SXJb0DdQ0k0HGzZbkh0wchQ5HYaIhadnR/t256S5AA2Ltyaxn1gUEEkfTSX:kS9JmVSvGWEAng/qwnYPRslWPLu1
-
Medusa Ransomware
Ransomware first identified in 2022 that is distinct from the similarly named ransomware family MedusaLocker.
-
Medusaransomware family
-
Renames multiple (8809) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Share Discovery
1Peripheral Device Discovery
2Query Registry
5Remote System Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1