Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29/04/2024, 10:12

General

  • Target

    07694e700490f9c8a5416d44a9a4897c_JaffaCakes118.html

  • Size

    182KB

  • MD5

    07694e700490f9c8a5416d44a9a4897c

  • SHA1

    85b77281b67174f8c87a7156a976981aec1fd5a5

  • SHA256

    1a9f06809b15af83898e753c3732c4173c7437f03dde9c0860bcdf0de4d75cfc

  • SHA512

    977b6e6fa321fb52dea0f9426bb5167d30474cb19d8f91753555d3d76771401c6efce3f77ed8dd312e8b0e51f0329f5047590d17e816954a0047c263081233b9

  • SSDEEP

    3072:SVyfkMY+BES09JXAnyrZalI+Y0Buv07w1GkjkjzO:SAsMYod+X3oI+Y0BuvuOGkgW

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\07694e700490f9c8a5416d44a9a4897c_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1880
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2616
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2776
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2808
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275472 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2360

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      02165fb36fbc5d34825729ea7909da42

      SHA1

      e58450be39e13948020a33fb18f32db24dd104cd

      SHA256

      5242a8cdf59896da951afe6c413a83a9cd75dfa8a15b599cfc679d051dfb83fa

      SHA512

      37622e965135bc521e517df8b5cf167c6b2866fbaed84c067ff5a3ea5e4c12be4164cc831815de51ef5ee39d7e9a12bb3fad06b67a0c0034fbf20625072e01de

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      7a690f56a13620d6648c91e61d114a95

      SHA1

      b2c49e892d302fafddb0e168e57e7dedb1568c4b

      SHA256

      157d99af77a1e807af3b0813daceb3b23ce7fd7660f64d0764286e03da218d5c

      SHA512

      4d08cf0ac699237a735ea330674426eb46f85db6676ed03af1776e2a3ef4ca929e0e2b28dc1f65b7623613d3093fabce38d72ead3d35700920e82662495d029b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      0c608deff8416c0c8accdc6db9393cf8

      SHA1

      aec38d6d50bdd06974d99dbec57ea483d4a3d701

      SHA256

      e220a1f0b297ba8a0ff64a53a902c63d7de36c560aca7a2072c09a81ae4671bb

      SHA512

      3a47b473adf6b584c25f588e42937f6b778a6e4dc572466caef127939ae4686677ecbbf8f0a772839932eddd30a4d6b81b17063b1778ed03a162de7849c909dc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      25d25433fae2ea1b69461ba5f20f2f5e

      SHA1

      d5e736fd4b36f89494d72d02978236cd0cc3c40a

      SHA256

      09c10598ced6d91b1b4c9bab2d98973199d749db712ef93e272d780ef91ff532

      SHA512

      76a76b97c734aac882dd73d89d3382a0f45d5db6f16d11532a664670e7de278294a7997f9cb44934dc09b8679b2c43f0314334630f11b84c45558b1f5b2417a9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      aa13a8e1add4fa0f86ed0297823688c3

      SHA1

      41adddc2a33b6b4647cf1b49b6aff2dbcd72b174

      SHA256

      ecb4ed006586a29accf31881830eef8d9c5f926eee1959847d427ef714f7eea0

      SHA512

      53e2536e37eb0c2d0d390e9f29df580243b90b498cb4b9fd2b6c08aa142b22cf32de2e24186224754a2d634ea4ec6c7c121a1f67458a496484c026d667ddbf94

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      6cd091b7b6f5d3dafb5cefb22269aaf4

      SHA1

      a3eb1bc1176aa1d62354760717b1cf78588fdcd9

      SHA256

      09787a6674e117b005df60173ffe7bff39e45f91f734fd9e25e983ad4d372554

      SHA512

      f97917a97eec052a63d6155411befa1e6832a75dabb19d69baa2d4b11b601331e6486a3631701624f8aa613893feb24fac2a15effab88f7f5f97bcdc3f08ebcb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      f581d8250815d69be410799c3c5a422f

      SHA1

      cab1981f4710bf27953ec9d9b0e4b7beabaada74

      SHA256

      7b9a421614d4879ac6634ec7b47f83378f5fa88a305721c4c1d2c1b6ea13fce9

      SHA512

      b19382f7daa2fdc85155bc2933f007df6db3a959b63e7ed779f5ce2f7f5a4654f226ecfb001e63df0138081a61370d0a65818650663f0c232a9a70e98180dd3b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      e3b2fe4cc66f01d55134d7c6ce46c540

      SHA1

      781a794ad05045885b3bf6ced5ea1db6dbebdde0

      SHA256

      6cc9f7d9aeb9ed50e1bd1fa81fdb67f37774fa383504a93e93d565a7751fb2b2

      SHA512

      6e840d37b89a39844c7ce825a149ece2ff374680a75572be885e6101c7e4585168f4c952c3a2329fef8fb780beb2354eefeac66daac01949c41ffa44e72bf95d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      8551b1bab4bd897127f66c19ae6b2fdb

      SHA1

      409ad1699b228a4c7a2e9c46b1d31717a21c71d0

      SHA256

      1d74aa4f06b92a26faedebb046f328b6bc626914d3c02af8d7c2115919a74046

      SHA512

      14d3ac4af19b6368c7c8e6d07b6cb205a1799fb0482f98f2cf7607cda7a29ac87416fcf5026c0249af79cd8fb5c8ece1e26b4a8154602f866a41f055d4e5e884

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      ddd2df3d49d01da1e2b3079e3d115753

      SHA1

      a381ff5cc516eab11b8eb405cee422a4052b8b42

      SHA256

      cc2051fa126f12fb9f959c2f73b91f2bd139dec00058254c7d549fc127adc62f

      SHA512

      8621e3b29d7e7c46259c4ae07eac3b4802d55d4654d8e055a4f57f6d8cd869de28ca80cda751b5cd9d4974a11460c4b7e9bf8c617fff331b195a32ceba3c07e8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      35abad1b8813e731177ad6659a3b6a76

      SHA1

      69ac62369301fad81bab000a6bc0a6f9669d74d0

      SHA256

      06f735e4146723c6fe9c0eac2b5deef212d5b4ddb64606a61bf239725fdb37fb

      SHA512

      5de34dfb655fdc64db5bcdb151804857e83d14eb28eb06141dd839dc3ecef09a9a3565bc9e5428f340695a1470eb7be9c5d2a7dd7f46037df0fd5e0b46c42ae6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      1e2298ac6cf2779359785ba1789bd66d

      SHA1

      d6231df3b1398682dec203e60a3408c3237c4440

      SHA256

      a32fc9fda2786af2f8837b3f6cc347d8bbeff99e643ae9f8e768e2c1942aebcf

      SHA512

      f19e1a007c6571b045d77a0e68fc13c3984f632295256ff57b35925803d83e06cc4da08a577f873012753a584934ac5153b82ba58358572dae2510ada8328072

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      8e6195db26df0835a87cc7c654304c6d

      SHA1

      872fafa3565037ff1be582c14c0f406bcbe475dc

      SHA256

      0fbb88c7b9efcb640472a180d5a36c84f87714ea9d76c097fb915574cc62beea

      SHA512

      51e3189274ce796898045dbb300e74fa93f1490e8c4ce4f8952c776110fffb08a9f693ff90df540404f17ed8485be077860a8fa42af90d6035bf29b0a7c89e1f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      724365e8da9ba329c7aa959ce47aad07

      SHA1

      1bfbdf868871cc3abdee90c995adc514c3a22c28

      SHA256

      d450b252f9e11c4dd34057272064d82f8a72764a7a07dbcf3f5a9afa8e5bf2c4

      SHA512

      5cb2cd3b08af31e7c72c03a0c7a574f22f65a99748e79c0c464886ad300e9a16e0a663eee1a651331a241eb44255b6bdaefb306ac09a81bcd3ece8b562655641

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      3b00c7308fd1ddeae11ef5da3e2aa1ff

      SHA1

      85523b14bcceed53ef19f35d9de7e23f852b494b

      SHA256

      1bedad6fa402e5f9806d9cb86810e11c862875c805718cd3d7659750bfd721ea

      SHA512

      be85e5d6e771a00122e7550c36f2b65510115593f47e6e8818457b1cae84985c5090de044a4aa025797e423d53e2fbbadcce9f81b0c3b53e2469d70bf641c10f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      4878bc1745a4f6360df0c29c1401b542

      SHA1

      22ff517ab9596332dedb7806dc3a599bc4bf2b6c

      SHA256

      0a21db2abe39da36a0dfd0b18f700307a74ce927b89bc13ed5519e81f7e2e246

      SHA512

      774b0e4d2ea5f74366a91b87d502bb894e26d10ff251a0ff9c946aa88775998e818dc63e440082977ce1150e09f3f350ab2fc559a9e16b99f32e2511b509435e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      af1a3f735dc3d09c53bc24ecde4478ff

      SHA1

      55833d335c254232179f5db558ade8a97ec9f66d

      SHA256

      e0795cf07eca0e2b15c7fcede8a8ef32b5cf5659b9d0bd07d55f0e01ea2a11f9

      SHA512

      1e3d0659ddd68c4114bcbf3cf77de587c029d8f96d1285a9595f7010978ce8d6fd20da7684f9c378a5a8e8c87b31ba96899055ecff789fd230fed1db56563f38

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      a3abe10621cd889782a68870044a31fa

      SHA1

      5f7a2073bc046b9ce39620e5bb805e0d95648aba

      SHA256

      089ba5192b318240886a499ec694fd0c958fbff5962cf5128c4f1a5aa284323d

      SHA512

      6d67118da3d2d3a5d082a82520f1c87768deb13052deaea40a73557218decebe7f1bc390e118c2488a7782b19f01e2a0f3fd2fe8c8fdb397c5ed295e1fb972bd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      4eae52ff13971b896c5dab2bbf1395ff

      SHA1

      08748f19848cf11fadbe5008266914408c0d907c

      SHA256

      ae54b7032f93b6fec014466354084aef36ca2539317d994edcb8f73eea4975c8

      SHA512

      36c9253d424e92c9e895f9b7232e2123bf91fdfacc08b6eb6d2f3ad1e74f70e27c2b494937020fc5cf1904f62d7743b94ac4e7c68cbd40455cf99517d794e83e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      6b1bafee5bd6f36eca5677069976034f

      SHA1

      1d49d3739b81f627fc7f0b6bd51cbcca19d1239a

      SHA256

      58145e0e04601fa0ccf64b1291940dcde3510ba9666766014dbc7eb51c9a3692

      SHA512

      2a6e5eecce85e5f44ce9b43038eba69bb528f09d2e0be2a5e1b72eec3539e63277d45d8d52e66a4ba6db7d67120e640e8d0a04364c081e03c996e8aa15e33cd2

    • C:\Users\Admin\AppData\Local\Temp\CabE689.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\TarE78C.tmp

      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      83KB

      MD5

      2a591a91440acc2cfabfd0221cfe1378

      SHA1

      add23a4e51dc5649984f56c235c48382f5c4f235

      SHA256

      2f37132fabb06650873ad3bd0b15d2c13596fc7be401c0ca05b443c9a227a44c

      SHA512

      3018caf86d187c14256deb92407157daf116720623c9ecd7d153c8456d4d1f9ec9b7a88db6db9a02f06367301af5d6c3d30e62f8ad04657fd651d4221a9287ac

    • memory/2616-9-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/2616-6-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/2616-8-0x0000000000240000-0x000000000024F000-memory.dmp

      Filesize

      60KB

    • memory/2776-17-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/2776-20-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB

    • memory/2776-19-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB