Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    189s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 13:41

General

  • Target

    1e061d17ed2f09115446a86883259be650c0dc6f11e6db3631882194760e94da.dll

  • Size

    712KB

  • MD5

    b0598f603501f4c19c6b5e12bbad0140

  • SHA1

    58abbab28c4290b4acf8c06b211cd0a495a5cad7

  • SHA256

    1e061d17ed2f09115446a86883259be650c0dc6f11e6db3631882194760e94da

  • SHA512

    5ea1551674e23d26899cc2763cf34c071dedc9b804d944b9738c850fa553ea1059fef8432cf3e026c182ea5d0748bf8b0511ec76a3b01fd16362e95cbebf5876

  • SSDEEP

    12288:KehnaNPpSVZmNxRCwnwm3W3OHIIf5Gs/Yklv44iNAzQxBJ:Keh0PpS6NxNnwYeOHXwKYwtiN3l

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 53 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\1e061d17ed2f09115446a86883259be650c0dc6f11e6db3631882194760e94da.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:240
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\1e061d17ed2f09115446a86883259be650c0dc6f11e6db3631882194760e94da.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:1732
      • C:\Windows\SysWOW64\rundll32mgr.exe
        C:\Windows\SysWOW64\rundll32mgr.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:940
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1340
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1340 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:384
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1728
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1540

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{4C465501-7806-11ED-9551-6E705F4A26E5}.dat

    Filesize

    5KB

    MD5

    ac305da3697933e990a6bca20f65b158

    SHA1

    4d0cf53e5bf994b6606c9ef9354d586ccb33a137

    SHA256

    3ada8e69735b5206fd4edafc13fc99b7d8051a2616c431d34c33cdd35c2e612a

    SHA512

    ee17c1c304027096087f70ffbfbb22db413d3cfca473e4ef2ce47b384386188e30cd1521ab57d8083b8740396b0ade25fc3863871103d5aad76bf7a8d4194095

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{4C47B491-7806-11ED-9551-6E705F4A26E5}.dat

    Filesize

    3KB

    MD5

    1023dee2ed8d382c0a5f5fe3542b8443

    SHA1

    131716d9283dad2f8e3f642f1674e98cfde1ed07

    SHA256

    c600708c2f3adbe338a81db032f985ebec4511d37f0a1c52fb41239928307757

    SHA512

    e9a9642ff3b3bb83993c7da13fc36f14c38940b2c47f2eedc137eda532c799cf182797a4cc7a39c10ce6e655489b01f693973e42ea24ae29cb2bc6b1a1cc1d08

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\YZHLRVXM.txt

    Filesize

    608B

    MD5

    d879d3687ccf5a1819f7dfbed732fd28

    SHA1

    6607a2e755ff7759f7512fa1e894e0aea068bd60

    SHA256

    15b9283915c69b568be4f0bd189e5ce6277b3cf962621b3d75cc3d76e04a82c8

    SHA512

    e0ac26cb6d526a6551eedef2ee5ba19e2e54a271c74922b0cabff566eda2d487d2e02fd93b8ae2ff71670d596d0bb731240e2334757af6350dc3d1f8222611f8

  • C:\Windows\SysWOW64\rundll32mgr.exe

    Filesize

    329KB

    MD5

    b9fafc0d8b37b03f15cb13306f83876c

    SHA1

    9ff757465fd46ef2d9d56c5e57a202f57cd06217

    SHA256

    b3016e8e6380563a2359bb84dc97cb81cc4638d9a52b48d49e576a8d777f65d1

    SHA512

    68a99095a0d24278cfa2f5700c16ee3459813cd31d10f5d8d38cac2c4dedfcdb3b05eb197b061f473965f000d869420fe279c6096a695414fec7de5c40a346eb

  • \Windows\SysWOW64\rundll32mgr.exe

    Filesize

    329KB

    MD5

    b9fafc0d8b37b03f15cb13306f83876c

    SHA1

    9ff757465fd46ef2d9d56c5e57a202f57cd06217

    SHA256

    b3016e8e6380563a2359bb84dc97cb81cc4638d9a52b48d49e576a8d777f65d1

    SHA512

    68a99095a0d24278cfa2f5700c16ee3459813cd31d10f5d8d38cac2c4dedfcdb3b05eb197b061f473965f000d869420fe279c6096a695414fec7de5c40a346eb

  • \Windows\SysWOW64\rundll32mgr.exe

    Filesize

    329KB

    MD5

    b9fafc0d8b37b03f15cb13306f83876c

    SHA1

    9ff757465fd46ef2d9d56c5e57a202f57cd06217

    SHA256

    b3016e8e6380563a2359bb84dc97cb81cc4638d9a52b48d49e576a8d777f65d1

    SHA512

    68a99095a0d24278cfa2f5700c16ee3459813cd31d10f5d8d38cac2c4dedfcdb3b05eb197b061f473965f000d869420fe279c6096a695414fec7de5c40a346eb

  • memory/940-60-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/940-63-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/1732-55-0x0000000074AB1000-0x0000000074AB3000-memory.dmp

    Filesize

    8KB