Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    90s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 05:07

General

  • Target

    55be2027b96a62dd5e2819200d0c6830f6bd9067038c9ae12a799cb9e9ebcf34.exe

  • Size

    92KB

  • MD5

    ace39dcc73a69dc5acaa647402223fac

  • SHA1

    006156927c376266eacdec774f1e887078da235f

  • SHA256

    55be2027b96a62dd5e2819200d0c6830f6bd9067038c9ae12a799cb9e9ebcf34

  • SHA512

    d2ca315cfc6eeac501a473ca48250e8523f3d012f613a82321aa19dc00ebe7a9a30afcab59b104d80145adac790f8b93a779a59ba9179213028553b0b47499ac

  • SSDEEP

    1536:bVZnxm6MG9xgfrvEaoiT/GyphjXDYjKwttoswRmhApE:znxwgxgfR/DVG7wBpE

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 12 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\55be2027b96a62dd5e2819200d0c6830f6bd9067038c9ae12a799cb9e9ebcf34.exe
    "C:\Users\Admin\AppData\Local\Temp\55be2027b96a62dd5e2819200d0c6830f6bd9067038c9ae12a799cb9e9ebcf34.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:4948
    • C:\Program Files (x86)\Microsoft\WaterMark.exe
      "C:\Program Files (x86)\Microsoft\WaterMark.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:2836
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\system32\svchost.exe
        3⤵
          PID:4860
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4860 -s 204
            4⤵
            • Program crash
            PID:4300
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2548
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2548 CREDAT:17410 /prefetch:2
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:3640
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1488
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1488 CREDAT:17410 /prefetch:2
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:4620
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 4860 -ip 4860
      1⤵
        PID:3408

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Microsoft\WaterMark.exe

        Filesize

        92KB

        MD5

        ace39dcc73a69dc5acaa647402223fac

        SHA1

        006156927c376266eacdec774f1e887078da235f

        SHA256

        55be2027b96a62dd5e2819200d0c6830f6bd9067038c9ae12a799cb9e9ebcf34

        SHA512

        d2ca315cfc6eeac501a473ca48250e8523f3d012f613a82321aa19dc00ebe7a9a30afcab59b104d80145adac790f8b93a779a59ba9179213028553b0b47499ac

      • C:\Program Files (x86)\Microsoft\WaterMark.exe

        Filesize

        92KB

        MD5

        ace39dcc73a69dc5acaa647402223fac

        SHA1

        006156927c376266eacdec774f1e887078da235f

        SHA256

        55be2027b96a62dd5e2819200d0c6830f6bd9067038c9ae12a799cb9e9ebcf34

        SHA512

        d2ca315cfc6eeac501a473ca48250e8523f3d012f613a82321aa19dc00ebe7a9a30afcab59b104d80145adac790f8b93a779a59ba9179213028553b0b47499ac

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

        Filesize

        471B

        MD5

        4132c54f59c529167c112e7f519120fa

        SHA1

        94cc9036fa031258aa744c7ee88e3c0b6c7a73da

        SHA256

        e9f456cf8bb8cc4a683d1c2f792feeb4c83fff24a86e6bcb260eff8fbff126fb

        SHA512

        e8efb8e81a90ffbe177301fbba4470ded104fc6d12cfa0123938b981d612eb2c4a66bb47b585cd43ed6ed4940e0ad5a1e3a5d9d18f8cb643e741aae694c4baee

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

        Filesize

        471B

        MD5

        4132c54f59c529167c112e7f519120fa

        SHA1

        94cc9036fa031258aa744c7ee88e3c0b6c7a73da

        SHA256

        e9f456cf8bb8cc4a683d1c2f792feeb4c83fff24a86e6bcb260eff8fbff126fb

        SHA512

        e8efb8e81a90ffbe177301fbba4470ded104fc6d12cfa0123938b981d612eb2c4a66bb47b585cd43ed6ed4940e0ad5a1e3a5d9d18f8cb643e741aae694c4baee

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

        Filesize

        434B

        MD5

        4ddaca6c38ad8b05fa1de9eb48b47280

        SHA1

        74ee6c1f699c1093d5ce1b5eabee1d5b10f301f8

        SHA256

        d75a151f61b1588e06b93251344200419a937f6732bd72ad5c4cfe04b9296aea

        SHA512

        9676b227c11b120b58c9743f5a393114c7b73eca192dab03b26dca406a48839fc9afe54ddda2b9880d926969ceacffd9670868ed113810ab1543ea15376b1e0e

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

        Filesize

        434B

        MD5

        d5780a08cd554d57f133d1ad9f770a18

        SHA1

        1734971dfa5a8c38cb0932a7c7eb71f73ba715d2

        SHA256

        a27862e58370e4ab629c39fcdb99ad4342abf41e9ca9bc3e7e0a51932a6e1cab

        SHA512

        de3236a741eb721b8886e11d97cb752f867de437caf4af698da2dc3600b399514e65e0f8483df097cb0f6358c36903f7013a1ba09007fa6cba0b06262f012c25

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

        Filesize

        434B

        MD5

        d5780a08cd554d57f133d1ad9f770a18

        SHA1

        1734971dfa5a8c38cb0932a7c7eb71f73ba715d2

        SHA256

        a27862e58370e4ab629c39fcdb99ad4342abf41e9ca9bc3e7e0a51932a6e1cab

        SHA512

        de3236a741eb721b8886e11d97cb752f867de437caf4af698da2dc3600b399514e65e0f8483df097cb0f6358c36903f7013a1ba09007fa6cba0b06262f012c25

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

        Filesize

        434B

        MD5

        d5780a08cd554d57f133d1ad9f770a18

        SHA1

        1734971dfa5a8c38cb0932a7c7eb71f73ba715d2

        SHA256

        a27862e58370e4ab629c39fcdb99ad4342abf41e9ca9bc3e7e0a51932a6e1cab

        SHA512

        de3236a741eb721b8886e11d97cb752f867de437caf4af698da2dc3600b399514e65e0f8483df097cb0f6358c36903f7013a1ba09007fa6cba0b06262f012c25

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{77C6A657-72EA-11ED-A0EE-567C1489C33F}.dat

        Filesize

        3KB

        MD5

        dd1bd46f04b0907c31750a4fff8ab4ff

        SHA1

        f30bb7f6949c642f8e3f9c1c8376cd1491c9acb6

        SHA256

        76e8de764932c9a74f7dea1b5c28fcd0b5eedfdbf504799e417efc00eb74ee7e

        SHA512

        66a3ca4fac7cf5b0a6376bd9fb44dc7ace6dde81fe63f2818f6b1e663ac32a519ea21dc8d8f9601297d1a20dbd18d05943afc59bf23cb435cb16d48a919605ed

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{77D02CC7-72EA-11ED-A0EE-567C1489C33F}.dat

        Filesize

        5KB

        MD5

        6b41b78a3d4300752e8079e43dd3ec17

        SHA1

        1517a6bc577b321ed7b8a1befc9f6f21dcbf580f

        SHA256

        d126640e42ec4bbd0425192b54f6ec952bde98825519a885e0ba1801a2dedb79

        SHA512

        be0946337adffe942e620536f5fa742dfa4e8aea5a93dd7a3a9f2b7de0bd6408309a5d8771c59d7fd248989c3dce6f55101eba468357f018fb513479a4e83f55

      • memory/2836-155-0x0000000000400000-0x000000000045D000-memory.dmp

        Filesize

        372KB

      • memory/2836-141-0x0000000000400000-0x000000000045D000-memory.dmp

        Filesize

        372KB

      • memory/2836-156-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB

      • memory/2836-152-0x0000000000400000-0x000000000045D000-memory.dmp

        Filesize

        372KB

      • memory/2836-153-0x0000000000400000-0x000000000045D000-memory.dmp

        Filesize

        372KB

      • memory/2836-154-0x0000000000400000-0x000000000045D000-memory.dmp

        Filesize

        372KB

      • memory/2836-143-0x0000000000400000-0x000000000045D000-memory.dmp

        Filesize

        372KB

      • memory/2836-149-0x0000000000400000-0x000000000045D000-memory.dmp

        Filesize

        372KB

      • memory/2836-144-0x0000000000400000-0x000000000045D000-memory.dmp

        Filesize

        372KB

      • memory/4948-138-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB

      • memory/4948-134-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB

      • memory/4948-135-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB