Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    91s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/10/2022, 23:03

General

  • Target

    1111ca5d87ee2c918e7c773c5a3e11d946754d83c7aa53b44f5630371c30e04a.exe

  • Size

    182KB

  • MD5

    467ee091873ec9352e515cd829f426a0

  • SHA1

    9b1976f6dd65d04e73895794c2c23a37e64b36f5

  • SHA256

    1111ca5d87ee2c918e7c773c5a3e11d946754d83c7aa53b44f5630371c30e04a

  • SHA512

    18340ee8507ec9df76c8f1a0cf57a5a0334ea98a9a9cbc9fa98980169c21e4c4a82d8d69475b3144045e75cf5fbbdc59d6cac0f2ffb5bfe20d0b8fedcc9e9f54

  • SSDEEP

    1536:JVZnxm6MG9xgfrvEaoiT/GyphjXDYjKwttoswRmhApE:5nxwgxgfR/DVG7wBpE

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 12 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1111ca5d87ee2c918e7c773c5a3e11d946754d83c7aa53b44f5630371c30e04a.exe
    "C:\Users\Admin\AppData\Local\Temp\1111ca5d87ee2c918e7c773c5a3e11d946754d83c7aa53b44f5630371c30e04a.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:4924
    • C:\Program Files (x86)\Microsoft\WaterMark.exe
      "C:\Program Files (x86)\Microsoft\WaterMark.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:4832
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\system32\svchost.exe
        3⤵
          PID:3596
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3596 -s 204
            4⤵
            • Program crash
            PID:3432
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2008
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2008 CREDAT:17410 /prefetch:2
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:3176
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          3⤵
          • Modifies Internet Explorer settings
          PID:5012
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3596 -ip 3596
      1⤵
        PID:4572

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Microsoft\WaterMark.exe

        Filesize

        182KB

        MD5

        467ee091873ec9352e515cd829f426a0

        SHA1

        9b1976f6dd65d04e73895794c2c23a37e64b36f5

        SHA256

        1111ca5d87ee2c918e7c773c5a3e11d946754d83c7aa53b44f5630371c30e04a

        SHA512

        18340ee8507ec9df76c8f1a0cf57a5a0334ea98a9a9cbc9fa98980169c21e4c4a82d8d69475b3144045e75cf5fbbdc59d6cac0f2ffb5bfe20d0b8fedcc9e9f54

      • C:\Program Files (x86)\Microsoft\WaterMark.exe

        Filesize

        182KB

        MD5

        467ee091873ec9352e515cd829f426a0

        SHA1

        9b1976f6dd65d04e73895794c2c23a37e64b36f5

        SHA256

        1111ca5d87ee2c918e7c773c5a3e11d946754d83c7aa53b44f5630371c30e04a

        SHA512

        18340ee8507ec9df76c8f1a0cf57a5a0334ea98a9a9cbc9fa98980169c21e4c4a82d8d69475b3144045e75cf5fbbdc59d6cac0f2ffb5bfe20d0b8fedcc9e9f54

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\69C6F6EC64E114822DF688DC12CDD86C

        Filesize

        779B

        MD5

        004e1f9f2b4726e5564e16c49fb4a831

        SHA1

        b57e588e3371a7fee13eaa737aefdf4e126dcf51

        SHA256

        bad8f107566ae2c13676df6b3c67da0642b6c850a6705acac03f460a6adb8dab

        SHA512

        5971b426d98c2f4e66708d490f513d66f85b89aa31479ec8e60e6b54b2afe32b77cf8d853d367f5ee173685129d0ba179739be5cf72a11a641d1cee6a28c75c4

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\69C6F6EC64E114822DF688DC12CDD86C

        Filesize

        246B

        MD5

        19904c11ccdb283e58ed27889bc0eb00

        SHA1

        421c8379bf765f6e04a57e2fe4811373385bc558

        SHA256

        9702fc27e6c9c82f8fdfe71f246da5565637338732d29d882e2659c1190834c6

        SHA512

        6bf526bff57e1eed3a01691483ee02c27d1e68f2bf6edc34e21fbf2d982f23ab2c87a52a9d78bbe67e361ff2fc55c5e68a016bd3eac18a275a4c88385d58682a

      • memory/4832-147-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/4832-146-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/4832-148-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/4832-149-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/4832-150-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/4832-151-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/4832-152-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/4832-153-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/4832-154-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB

      • memory/4924-140-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB

      • memory/4924-134-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB

      • memory/4924-135-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB