Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/10/2022, 19:01

General

  • Target

    dca875517a91dc40d1b7c9f2c87de83f122cbda80c14611f69a7e9b02d7f704b.dll

  • Size

    228KB

  • MD5

    821a30f218c9859df50ad9cedebe7c20

  • SHA1

    c4cc3a351a90f84a8620c8b72996e5f53f4368cb

  • SHA256

    dca875517a91dc40d1b7c9f2c87de83f122cbda80c14611f69a7e9b02d7f704b

  • SHA512

    479dd141586f4ecc368cc7b8ba29d76b00fa5124ba3f5e517cc44910cd0bd3012209b2f57a4eae59094eb723b4046f0f84a56ab747bcd090d2371d4ea662c9e1

  • SSDEEP

    3072:00NbrbkYHUyP9eECVWfpIhbWoVnW6IioARoKO7JurNeBTg4vRP86T9OB/nDN02Zg:nrkYHjIWeWcd7MRMnfn0e5BGCeR

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Program crash 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 46 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\dca875517a91dc40d1b7c9f2c87de83f122cbda80c14611f69a7e9b02d7f704b.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4156
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\dca875517a91dc40d1b7c9f2c87de83f122cbda80c14611f69a7e9b02d7f704b.dll,#1
      2⤵
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:3692
      • C:\Windows\SysWOW64\rundll32mgr.exe
        C:\Windows\SysWOW64\rundll32mgr.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:4248
        • C:\Program Files (x86)\Microsoft\WaterMark.exe
          "C:\Program Files (x86)\Microsoft\WaterMark.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of UnmapMainImage
          • Suspicious use of WriteProcessMemory
          PID:2568
          • C:\Windows\SysWOW64\svchost.exe
            C:\Windows\system32\svchost.exe
            5⤵
              PID:4696
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4696 -s 212
                6⤵
                • Program crash
                PID:5020
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              5⤵
              • Modifies Internet Explorer settings
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2788
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2788 CREDAT:17410 /prefetch:2
                6⤵
                • Modifies Internet Explorer settings
                • Suspicious use of SetWindowsHookEx
                PID:1744
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              5⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:4032
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4032 CREDAT:17410 /prefetch:2
                6⤵
                • Modifies Internet Explorer settings
                • Suspicious use of SetWindowsHookEx
                PID:1496
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3692 -s 608
          3⤵
          • Program crash
          PID:8
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 3692 -ip 3692
      1⤵
        PID:2512
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4696 -ip 4696
        1⤵
          PID:1228

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Microsoft\WaterMark.exe

          Filesize

          60KB

          MD5

          94f2f6ffbba8e7644668b51b39983916

          SHA1

          63357bbdf90101969117983dbc0d4ed0e713c4d7

          SHA256

          ede7603855cb37082c241c720a6650988c684eb3bcb263e5dd7b457458940fed

          SHA512

          d04430ceac70c6fa71d07d9ee82ac2bb5e6c0641d5c9e7e5a3ed39d342e8b198f367676516a55f0653e0b88635a027b9ad220e223145b8be8df281bb6faf7156

        • C:\Program Files (x86)\Microsoft\WaterMark.exe

          Filesize

          60KB

          MD5

          94f2f6ffbba8e7644668b51b39983916

          SHA1

          63357bbdf90101969117983dbc0d4ed0e713c4d7

          SHA256

          ede7603855cb37082c241c720a6650988c684eb3bcb263e5dd7b457458940fed

          SHA512

          d04430ceac70c6fa71d07d9ee82ac2bb5e6c0641d5c9e7e5a3ed39d342e8b198f367676516a55f0653e0b88635a027b9ad220e223145b8be8df281bb6faf7156

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          deabbdcb221537d48aed54816739f367

          SHA1

          9ce0f0d21d9bd08823732047e19edbbd909396bc

          SHA256

          494de69d83714780f68a1e6871716f3a4a10835e90b4f96e48610c3e8f39e9cf

          SHA512

          95a80c34ddb83e74e51e5d0884dc7433de78b956db8fb2b1fb54e0f158283991edacafd3e7653161767a69f25f9cf537cc1a654d20e3f27bbc54588b3b4bf5e8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          deabbdcb221537d48aed54816739f367

          SHA1

          9ce0f0d21d9bd08823732047e19edbbd909396bc

          SHA256

          494de69d83714780f68a1e6871716f3a4a10835e90b4f96e48610c3e8f39e9cf

          SHA512

          95a80c34ddb83e74e51e5d0884dc7433de78b956db8fb2b1fb54e0f158283991edacafd3e7653161767a69f25f9cf537cc1a654d20e3f27bbc54588b3b4bf5e8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          434B

          MD5

          085e353bc8dc8ed2b29056c504bf61c4

          SHA1

          b335ad51e5a5e06d25bea6d9d565fd697f473138

          SHA256

          41a229f7c5a24fca3b304e492873314823fa4e42e64b5960de2a5f83c8670c56

          SHA512

          9bbb590223e4f3d53f0861f51cd0652c297ece30e5d482b3f03c2c4f0bdeb9dd58bc7ccd4f7e4d809d127009fc2ce03b879d029b28b334b72bb86870656d8728

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          434B

          MD5

          eb7dcf10f81bd1fe4129d811ab0309e5

          SHA1

          a52a62e7f90f7c1a38ae9774e3c04e5400596d90

          SHA256

          dfea05b1b358592b7778723ee17e729fbbbfc3c92f3da8659e5d1866b5153b62

          SHA512

          63126d68ca0eef0398823809f0693ff627744a592298335ee6401883265d79d5abf3566c71ba1be5ed6881f54bb4eec0a5f886ae41ff108d3d8c2712dbe7395c

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{9FCB1997-5919-11ED-89AC-4AA92575F981}.dat

          Filesize

          4KB

          MD5

          4d5dcff6acc3c635af18afd5720f08ca

          SHA1

          ebb9b35dfc094b6afaa870f1189fbecfd340512e

          SHA256

          f7560ec4c8c2bdf90017c957ad90b887485a4c524b7a2af91ca490361b4c5483

          SHA512

          d9746d742ee87f2d5c79803acca23db8d74817e4223738488c843d5f0922817cc89814b4f8092cc648388290a574a219c3f912db3a77510ac9e277cc141cd533

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{9FCB40A7-5919-11ED-89AC-4AA92575F981}.dat

          Filesize

          5KB

          MD5

          eb026ccd5f57b3f181a8f673a75d0219

          SHA1

          f3a30aba72deb373ad4259445a61d26694ccb4ae

          SHA256

          272d5cf5bf6adc0ae9c70eb19327bc715983fb57d145679c80ca5ed285c69d71

          SHA512

          f99cc3c16c25752bf573ee184f995d36d7efddfe6832b00202423eeb7f46644b4a5f7146a7a3485dd49e69e62f566dde51d1a503e5b04cf4579c4424cb43331f

        • C:\Windows\SysWOW64\rundll32mgr.exe

          Filesize

          60KB

          MD5

          94f2f6ffbba8e7644668b51b39983916

          SHA1

          63357bbdf90101969117983dbc0d4ed0e713c4d7

          SHA256

          ede7603855cb37082c241c720a6650988c684eb3bcb263e5dd7b457458940fed

          SHA512

          d04430ceac70c6fa71d07d9ee82ac2bb5e6c0641d5c9e7e5a3ed39d342e8b198f367676516a55f0653e0b88635a027b9ad220e223145b8be8df281bb6faf7156

        • C:\Windows\SysWOW64\rundll32mgr.exe

          Filesize

          60KB

          MD5

          94f2f6ffbba8e7644668b51b39983916

          SHA1

          63357bbdf90101969117983dbc0d4ed0e713c4d7

          SHA256

          ede7603855cb37082c241c720a6650988c684eb3bcb263e5dd7b457458940fed

          SHA512

          d04430ceac70c6fa71d07d9ee82ac2bb5e6c0641d5c9e7e5a3ed39d342e8b198f367676516a55f0653e0b88635a027b9ad220e223145b8be8df281bb6faf7156

        • memory/2568-153-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/2568-158-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/2568-157-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/3692-154-0x0000000075510000-0x000000007554E000-memory.dmp

          Filesize

          248KB

        • memory/3692-139-0x0000000075510000-0x000000007554E000-memory.dmp

          Filesize

          248KB

        • memory/4248-140-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/4248-138-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/4248-146-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/4248-137-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/4248-136-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/4248-142-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB