Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    134s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    13/11/2023, 14:45

General

  • Target

    899024f807edc97dd31e840d0db459ef2f26cbf9f7472b5d74c7905897812ac4.dll

  • Size

    1022KB

  • MD5

    23aeeac9e1fc70cb94305c8a4580d65e

  • SHA1

    792e3e656090c1c69777fa2793a15b070a9e9aeb

  • SHA256

    899024f807edc97dd31e840d0db459ef2f26cbf9f7472b5d74c7905897812ac4

  • SHA512

    e990805fb43c8f3e846a67a1e8e493c77eb251c9624cc4c76ec002469efa648a14b93536a4a7af343ba3240ae12962b018f0a4edc1a3ce98bb4e295a8bc2bf44

  • SSDEEP

    24576:avRSE4AwGS+/O00kLnW0FBhNoxRiiI8Msr:avc/A3p/OB4rk1Ms

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 13 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\899024f807edc97dd31e840d0db459ef2f26cbf9f7472b5d74c7905897812ac4.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2788
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\899024f807edc97dd31e840d0db459ef2f26cbf9f7472b5d74c7905897812ac4.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of WriteProcessMemory
      PID:2824
      • C:\Windows\SysWOW64\rundll32Srv.exe
        C:\Windows\SysWOW64\rundll32Srv.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2844
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2516
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2988
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2988 CREDAT:275457 /prefetch:2
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2648

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Microsoft\DesktopLayer.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • C:\Program Files (x86)\Microsoft\DesktopLayer.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • C:\Program Files (x86)\Microsoft\DesktopLayer.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3438ad9c32ed730d6bafadeaff15b5b1

    SHA1

    b15831f29ba7ae1c5c1a6c3ab991a58a103cb95c

    SHA256

    f6b6f7d02d2c13e447bbf4eec59e443da11399c814f06bcde627805afee12c8b

    SHA512

    1bb6e6ffc26af3f62a444a0a36a5319cc7153cce9a703c50536f886624cb44b0b7f7346b4f4ede674292c85cfadd45783e11599da5b2ce30a596ec6d11c3417b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b8b296f9f3ea7bb261b477ae52a0334f

    SHA1

    6e0b882947300080fe08e5b93c4e321416d23da1

    SHA256

    167eea61edb8bde1c162b1927ecca9d96dcfa5e36ddb7fb9fa6cebdd92023430

    SHA512

    aa03f41edc6cf89813334f778acde5f3cfd4df27acb37ad1e5178f9f060178908c08d31567650516c1ca7c03541942e81c35793732a621e4c7704b755a35d244

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    563422a74e83b9d36d1365746720c799

    SHA1

    69cdceeb0530237f9cb4129e13b6b27c97df86f6

    SHA256

    580526e88e9914f6d05c8f6fd434ba7b6eea283a74b3d42a6fa157fc2c2834d7

    SHA512

    55183dda710f769351708975378facd562a19feecbbb70143cd97bc855123dbf49b70f4e04e5afcf82a121210585092be545c0436576764d5410646786c8dee7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    15dc77cb25647f04080c530d2f03f2d5

    SHA1

    99de22d1e5b7242e8ef0d8162fe7c5fd314b18e3

    SHA256

    5825cb9aabc6241107f7d164394b9769f40d83eff72f850385007b5c07a224db

    SHA512

    ffe26b59cd6195f758d07821c371a8abdef075927e6a2e7e45e71f3424bb48b9ef0294b8d918a3fb7bffe7299701ee9a7061ea2d591964ebb9115f7844aa4859

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ddd2b35d842c088ac24c164881940d06

    SHA1

    72846f1c2ae74e63d0c2db3334b02a0b6fd1df2b

    SHA256

    c94296cab660d2375436618065baa733a337b3ee7f82898381ab3907c6c3b030

    SHA512

    05f575ddfc02638abdffa5a176ba492b9e00cd0ee4ef20d78b2cd9816fef953993cdb50b78cf528284defea28cf4dfd050ee52a5b6e37a5cae882e6f17db894f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d29d7ee541a655e102db538e825277b5

    SHA1

    25f47de266648a775eb60f7cf4398338ae10a86d

    SHA256

    426c13952a2ce88d3e9c47a0ac9c5e0eb454821bc9442c61338e846ca86bfaef

    SHA512

    fcf6a24b08404ca4abc242fb2b6482753d5a42feeb99d35deb3741f6872d6f7f4e753204b8920867a69b6536c8e27991b0f2562edfb34e90a75f59acf39c9b5e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    63db61844737d390ecc9c82fe78ce0fc

    SHA1

    812e844615e540c4f803568840747ec66c1f815a

    SHA256

    461d39ea61370ff38e47633655c245df950c1282aad61015714d1c2284f7a397

    SHA512

    f578d7b5ac3f39094f0372ae06232615fd4af0e83d94e8288f1f261773b79b4a89c1e251dc49d5ef15c6794bd4a8d8b691e11ceb5a8c02d5abb81b80cfa5ea93

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8e2574677ae3d3a6b045b87a12da9241

    SHA1

    74f2f282424a16c3bc716f551d5d576c1975b2db

    SHA256

    d147465f28ae8a9e05eae7610001bdb6795116c404b91c37817c62ddbd6bd36e

    SHA512

    c1eb60afe87eebc59105f2b0edc319686af45db800f8d0f4ea197df6d634e16659f319b81c547d6b81b1b11a41d5c6c562f12deb116d09fa6e152a098422b3f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3c9098388eba0672224631362abae3d1

    SHA1

    925d3080ad8b3b1f6bf362dbc26b71877d940275

    SHA256

    50d80bdcece254726a113cec92ec6026f7a94f445135acf325a100a50ab3d0e3

    SHA512

    05049531db3e9cece16fd07e5809fe8cd46433673df8f7d699b1956ce81b62de3ec77bf0116493aae4f008b773cecb5d8d98ca51ab3cdbc7356ac566cbc76bc1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    76658baa18505eff9996d483a3bb5173

    SHA1

    eaadd5f35b1e41baf03de5a11320e982c2e3a9fb

    SHA256

    7521ae54518f864ab5b9054b43e1aa66158bd0dd84a9d745bd89d4bd7c21416a

    SHA512

    6c9e32f5b6177b1cea2efc451fd81f97589e4a131a839d841a7f04e9f808ac44a71e64faa1b210e7cf6ddc6b14579f6faa9ddadbcb453e6f73ed396301574bdb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f29f3042ae559be96746843b85d6ac9b

    SHA1

    c8f616e2df52d802770d57e5ba0c2a0ae8249edb

    SHA256

    55afdb039430f1c353b8da0b10ec75808332517fa6053a0893f7787059c544b7

    SHA512

    a1a9504021f8eb0d932b50ef5a50f4bfc2eacf17e1040425ba7875018005a08aad18d7dca5e80b8ba3afb8724a5be47c7f5cbb087644cdfda3526fe6d9c86304

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9c0d09a2ffe6b91e7fbd807f9aeeefc2

    SHA1

    0faa114b1f25169ce081444ae98d94682f650d71

    SHA256

    3c361c5522bbdada43c5d25cddcb3779a23908870ae3a7f11eb8eb10fe760a73

    SHA512

    8b6ec6b784a186ecf922c670f855c331c3c76dc091f638645d9fcf1805ff1279952135a618c6fa1a0d5503f18b11c3362bc1c74127594c083c3a8237acdc04f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0fd7739cc36d824c3d4abdb2ef155a3d

    SHA1

    3b2a7b4378af3e32e78ff4697b3a0acfe4bc8874

    SHA256

    995b6aeb1674526c453fe16fab08cc8023de455a657ac3c377b426a4686a5269

    SHA512

    9381a61c983af70a9b1e832cfcedde9532d9044e1b6d796b578b23da2e1e9783082596de4d17784132e294a92b1e263370247ed599c3d3152a94c76ad29f9343

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    31458d423da66fb0e5630fced7132de5

    SHA1

    33948f9bca1ab96dc30edde96ff4e62cd4f6b2e4

    SHA256

    0d5eff3c597be2e6f870547fba86053adbaebc015107987326ce3ad331110d12

    SHA512

    f75e1b3ad436365a391eee411591d64422902b99acdfac85de3bdae787e025177b6d171b5e14b3ec2373abf1d0c2c4265af1a732d3d3a33f36820b82864e6070

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9d655f2f1a01151d4c100629b7afb051

    SHA1

    03c5750c5e13d73c82ec0676d839f9e8bf493a31

    SHA256

    bb9b6acdf02c06f988895b9fcb567146bd3333492dd6f8904a53d03261b311ad

    SHA512

    80df84ff0d592545536b3051dc644a64d685a336148ab0cd516682a875c454801b8cc61306e9e721cd13173ace5789b88b98b30936e028ca2d539687cc0b90f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7f81a72c4ceae257540b160abd422623

    SHA1

    cb0e1f5feec0709bc4fc132783e152428dc0053d

    SHA256

    4635ca3eeeb93b95ae89209b5eba2e7ca059df0897800715c569c84448a97420

    SHA512

    4d9fc3aead67293e8c1aeec77a31c9202a40bd81ce9f8abc0b15acb877a4548a9de6b8a9648b74e018471a64e31f2ccb64e59a4640b209bac0c5be9876ff1d7a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e7a1c7a4c4504638e10b7d4cfdb346af

    SHA1

    6d4a9fbe2a392fdc6b031d512895244427b04748

    SHA256

    b00a6822f97d6d4abf6e0efea41fd335058b6b4658c8471f5bd5d113ce167145

    SHA512

    785bf24012db3ef4d739ffe63ab47d88bc090cd894569da17fc201ece09f6c0ad171a6fcb4e228e91ab45db0a9679ba4eb8ae807b1216bed199bddc5c9d56bb6

  • C:\Users\Admin\AppData\Local\Temp\CabB7DC.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\TarB82E.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • C:\Windows\SysWOW64\rundll32Srv.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • C:\Windows\SysWOW64\rundll32Srv.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • \Program Files (x86)\Microsoft\DesktopLayer.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • \Windows\SysWOW64\rundll32Srv.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/2516-24-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2516-23-0x000000007773F000-0x0000000077740000-memory.dmp

    Filesize

    4KB

  • memory/2516-22-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2516-21-0x00000000001C0000-0x00000000001CF000-memory.dmp

    Filesize

    60KB

  • memory/2516-20-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/2824-0-0x0000000001CC0000-0x0000000001DC9000-memory.dmp

    Filesize

    1.0MB

  • memory/2824-14-0x00000000000C0000-0x00000000000C1000-memory.dmp

    Filesize

    4KB

  • memory/2824-3-0x00000000000C0000-0x00000000000EE000-memory.dmp

    Filesize

    184KB

  • memory/2844-11-0x0000000000230000-0x000000000023F000-memory.dmp

    Filesize

    60KB

  • memory/2844-453-0x00000000002D0000-0x00000000002FE000-memory.dmp

    Filesize

    184KB

  • memory/2844-18-0x00000000002D0000-0x00000000002FE000-memory.dmp

    Filesize

    184KB

  • memory/2844-10-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2844-7-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB