Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    131s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2022, 11:07 UTC

General

  • Target

    33857e703b65a87ecefb4624607b8b28a47d96540d641dd29ad20a3e7ca81d5f.dll

  • Size

    96KB

  • MD5

    0a4566c77cbd26c01b34d1d7e6637ff0

  • SHA1

    77a3a44c23d1767c130cd39d722ef0a592dd6857

  • SHA256

    33857e703b65a87ecefb4624607b8b28a47d96540d641dd29ad20a3e7ca81d5f

  • SHA512

    380635ef75177339b72bd1dee46925c1edd165ae6ab5f4889151638cf49ab0bc9084967044211b23d93ed83fbc86466951fe4e948f3f29e8f2353ccd970d0375

  • SSDEEP

    3072:qD/1QkfFFFnHLidQXdoTfnUC6l/lJCCwRzlGDF7Gq7:qDSQXd8fnp6l/L7wRzm

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 1 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\33857e703b65a87ecefb4624607b8b28a47d96540d641dd29ad20a3e7ca81d5f.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1348
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\33857e703b65a87ecefb4624607b8b28a47d96540d641dd29ad20a3e7ca81d5f.dll,#1
      2⤵
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:3204
      • C:\Windows\SysWOW64\rundll32mgr.exe
        C:\Windows\SysWOW64\rundll32mgr.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:5084
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4484
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4484 CREDAT:17410 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:4808
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3204 -s 620
        3⤵
        • Program crash
        PID:3824
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 3204 -ip 3204
    1⤵
      PID:4224

    Network

    • flag-unknown
      DNS
      api.bing.com
      iexplore.exe
      Remote address:
      8.8.8.8:53
      Request
      api.bing.com
      IN A
      Response
      api.bing.com
      IN CNAME
      api-bing-com.e-0001.e-msedge.net
      api-bing-com.e-0001.e-msedge.net
      IN CNAME
      afd.e-0001.e-dc-msedge.net
      afd.e-0001.e-dc-msedge.net
      IN CNAME
      e-0001.e-dc-msedge.net
      e-0001.e-dc-msedge.net
      IN A
      13.107.13.80
    • 204.79.197.200:443
      ieonline.microsoft.com
      tls, http2
      iexplore.exe
      1.2kB
      8.1kB
      15
      14
    • 8.8.8.8:53
      api.bing.com
      dns
      iexplore.exe
      58 B
      171 B
      1
      1

      DNS Request

      api.bing.com

      DNS Response

      13.107.13.80

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\rundll32mgr.exe

      Filesize

      54KB

      MD5

      fba9053e3a7f286a68a072f5d1b57b42

      SHA1

      19c4800e8de1e83ff7bf0b96a96563e8430ce9f3

      SHA256

      5675295a26c3839803fd25fb667f2be09c2b6bf3412202a09c3dfc9a46eb4ca4

      SHA512

      ee53bbd9531801df780279da49bd34863513db67fbacbd6b0abb844d02cb76f5e86ed39ad28585b27aa42d3659a8fc9f3d1459f92f81eca970e69bac7c403c64

    • C:\Windows\SysWOW64\rundll32mgr.exe

      Filesize

      54KB

      MD5

      fba9053e3a7f286a68a072f5d1b57b42

      SHA1

      19c4800e8de1e83ff7bf0b96a96563e8430ce9f3

      SHA256

      5675295a26c3839803fd25fb667f2be09c2b6bf3412202a09c3dfc9a46eb4ca4

      SHA512

      ee53bbd9531801df780279da49bd34863513db67fbacbd6b0abb844d02cb76f5e86ed39ad28585b27aa42d3659a8fc9f3d1459f92f81eca970e69bac7c403c64

    • memory/3204-133-0x0000000075750000-0x000000007576C000-memory.dmp

      Filesize

      112KB

    • memory/3204-142-0x0000000075750000-0x000000007576C000-memory.dmp

      Filesize

      112KB

    • memory/5084-137-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/5084-139-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/5084-140-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/5084-138-0x0000000000410000-0x0000000000419000-memory.dmp

      Filesize

      36KB

    • memory/5084-141-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.