Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    133s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    09/05/2024, 13:51

General

  • Target

    2a42e75b9ddd9e280b6886b73afcef3b_JaffaCakes118.html

  • Size

    130KB

  • MD5

    2a42e75b9ddd9e280b6886b73afcef3b

  • SHA1

    3668a1385336a0d3b5b1cb0754af037108d511da

  • SHA256

    87a3ea505298c3dc54925aef6f480e82bac8c0207afbe09730ff8926ef872a40

  • SHA512

    009a3bb474208d9a858d343c64daeb7832aff1ca8fcbee34eeddbffc6974e8f44c9a7bd1bb86d769d7459b0cba9fedca80ca8d9f8614fd192a65c870718b058f

  • SSDEEP

    1536:B1snNxvNdyQ8U6eMLxOb6bYbwUHtbQb1bSpyLi+rffMxqNisaQx4V5roEIfGJZNu:BG9yfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2a42e75b9ddd9e280b6886b73afcef3b_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2916
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2916 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3048
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2988
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2652
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2444
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2916 CREDAT:6370306 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2420

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      3504a54e1e2c2b0bcff89b3a42bf0211

      SHA1

      c817cbe98ed80d0ea5e517a7ac0de9a4429969e8

      SHA256

      44838d286db8713b090e4416145441206d04b10f382093667d38ebafe451e88a

      SHA512

      c5a77b071ac2be852b320d2646cd271114b87585bc8642ef9622695e0f3687df6303d8662d818efa234cc189fa5730eb08537cd80bce8d9b405606ff066e0170

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      c0976165f8d70157f5c794d90b702601

      SHA1

      38c67d6914192e0876624eb11a732aeb6246c6c2

      SHA256

      a77b0dcfabb656c65272cc347cd1319ef961ffdc6c0fdb951ebb6984c6cdf211

      SHA512

      f7ba54b58017341cf04dd5ee35cd7044bc4708ae41f458e4d13402df39e8402eb5c2a64bb0e8b642d069fcbd9ba4f6923e16c869b4634d519b49b2fdbb13ac72

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      82cdb93b45cb7a01e688f8b61de81bc4

      SHA1

      8bd30ac84fdfb7278e06615a00909495d6f3d1f1

      SHA256

      d30cafe36ddd47847288b802f14db1beaa50620ed0b422ee60ae74a914127b0c

      SHA512

      60a808540b0c0194ff3b58bee57ade4ce9eebd85b4f0735ae5ac6b8ec43b54aa19696ea44d16744a921db0ec3fea7ba9dbd7dd8e0c5d62d82d868a791cf22583

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      0f57d0f73e84d424f6b1a54b879d5f54

      SHA1

      323df8871791bd40df76b5a713c469291ac096a0

      SHA256

      db3699ff6f05f3ea943673c9722d1e742d5fe5496fb5c8c242fc4b7a51c03092

      SHA512

      867e06053bddd8d40b644a644b867e28f57d78377fc69b91b347975cdfb40d66e49a286a8874bfc60720e25dc1388d32ebd2bea30c9c4c8398a9f4f9b3535529

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      3eb813bfc68cf046d922ae5d7218b1fc

      SHA1

      744040ad0a36c57a23cf7314cb8192462ca5cc8e

      SHA256

      becdf05fba42e391e0efefcdc6269b1566815a1ffa2cbe3e71b050456f8d758d

      SHA512

      80c39144b60b934e59f1bf645c8fc87abb5fe88cc701f35910adb61654ae133abe5aeadc053b132736b73a2a390252f9553108c1de1f9559ac0be4a62bfcfb1d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      f1a60bbaa490e0f5dcd097df68e1254d

      SHA1

      7d1caecbc51249b767f4fd0e7d6cf48052dfda44

      SHA256

      ccbd7b2cabd4ae8edfb95ec704fbd1a425fab65860422b8b35d7903eaedb75db

      SHA512

      9c3c82b357f67863d56801254412dcef0395d7bb9c4bfc1f5b950af3c623cc5e5871432d035e7fa7cde20df750347ee0326368e741e6ba65e7ad3c8ec3eb820e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      64612833cd2e02983061e9f4189388d4

      SHA1

      edfb3605fe5dba93c039f8159c83ada410387351

      SHA256

      a25053dd3fd4af2b160d0e138dd14733c6b2ed1c06082d1b9b27dae1843ac932

      SHA512

      4f4b1bcfe7dba27ef2c191d1d0a5d99da47655e34d687f89b04a8e4f042f304eac9d398fadea4a672b152bab7db989f82a93bd34421c310afd61e0ab5d76855b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      c17fc37fa58a1cda43a0b232ffca4260

      SHA1

      39527df33e0f11a2e84faa3fd4aabad0c2a12575

      SHA256

      c2e5fb1e733675230fe45ace2610cbd9522f0440b021440bbb062b8de34c404c

      SHA512

      b3e5cfc79fc5cf614751c2ac24bfdeb8dffd646655eb54d5ed7df75673859ec3349826e5076dc7275f8d1085fb1ef673a23c46aa97a1f2f67914a436271f9f04

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      3900735157e1aa919fe25bdcac69c4f9

      SHA1

      715db9a6c0fd82416201589bc0d7b7c8b25f8150

      SHA256

      16e03c491ce68fb31626d6501814daa01201d0d5507d3deda9cc8d560bada1ed

      SHA512

      a54471d72bbd8945ea9232a7037085870f8cd29f519f682bf276293d484d569875da48b796c4d26f621f05e26ec1b397e52a04756e67ecec59cfa5bd8a998439

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      a2278e9717a521a42733506dc24c25b8

      SHA1

      8dd92f6dd7062b6657425b6beb7d9ad2e86b3e21

      SHA256

      c72a164183bb74ca2e650a1d96ee08fba77f1311d2677c185d043de7254f3054

      SHA512

      79f1e52b46cf210be9b2371d81b4fe47fb7666618efb76ce8557d655ddacdf38a433d1e565dfc648ab6b2e2bc83808d8aac29bf0d99fda4436b7d668299d1c08

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      e31b0752a8a396c790c79415b942afb4

      SHA1

      0428c3b5be978dc7572bdeba7f45c71381282464

      SHA256

      bb64aef7d7c4de676cb4b49c10778fa76bad326cba0a2511fd4d5c48878764c7

      SHA512

      2cb82f1d9119445f91e336171180bc42a1d47fdc138cfa71329226663a54a0df570618fb7a906dff6a9a3c89e8beb92763257086bca2d370aef0384896576742

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      c1c172634e55362ba9cb63bd38c989ea

      SHA1

      05240c2a3df489d2f42f094a02f7b666d4088330

      SHA256

      3d63ec80d2cb9e0848d66229b4c166292b4f43b7ac93d1fd41109333ef9493ae

      SHA512

      48c21c762d9b5bc8d9aee9ca44720b8446458f26d375409f396215a00d6d28aa98502616fd1a5cd159ca2449fe5ee52e71e242719f816d7241d82c0ada350460

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      69b2891d2f6161ca2fc478889fb3982d

      SHA1

      aa4a27012211fc31738195d53e73f890468ab91c

      SHA256

      fbeb05824065a8e66389771474f17a7e873cd2763982a2e058e8711d00e746db

      SHA512

      2998c3ca5f4678b198638735bfc108244dfedb390215316a1c8465438f4c9aabb5f67e1bfb1a081b2c3d92837364a623911607c7e622786c15b30bbe8e232b52

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      1610ae97a9327feef35115ac8a0082b9

      SHA1

      0b678434e169d4c47b281a101ab1fb59b4bb8dd5

      SHA256

      43e84fe71f8030a6d6b4fce500a3051f5d9f8427acdb7ce286d7343cd36d1f20

      SHA512

      10525dcd59c9581daa5f7435b93eae9d3c7f2755d980c009986c9311c41acd3b0815a90c886b55ea5abb0dfaea6e766178a915b61f730af3af49022a2e21b716

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      784cd8b5686fea226691471e0d500168

      SHA1

      cf9d3e80cc85529abc3340a1f6b1f4356c72f8d2

      SHA256

      697e3ccb12cd4012ccf517007c4ec369bb7824f92c88c708b53f0edc1f1f841b

      SHA512

      7b00254da84b858608fb17ad592f52f460ea1b7f3ced2155095755bce6a36ec7304f78cd31623b5e03580ffce0175609a51c44cbbe95aadab71d167469432b08

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      683c2def04be2c433d4b2be93d2f0095

      SHA1

      24b1e3ad86350a4a4f92fab47d4fa58c43c00a56

      SHA256

      abf84f8aad864fff8d9ff957d819434709ee7a0b5e368721739f225177be880c

      SHA512

      d031963630b0f8720688280fb26ae2ad206b97fae83628acfa5e89788bbc1ac7c71b7b954f3739ca7cdf706c49cbb01990be05b4b7c47518acae64e40198a879

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      10767fc7de26d09935012970188c4d1c

      SHA1

      c63f04fc9581d254c18279d80869828640a917d4

      SHA256

      53c240368c2514b2fc63ae946260625ef80fba9515f8a7fee5ab4091cc4eb932

      SHA512

      a6958c024f954d9eccef77f33c6775597a97efdcdbdc96a73b3184bc1b923a07f40af94702bed59ed04c6d1bd47058658708fbba868012e15ebf5682e5a091b2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      9cfb46fabc8dfaa56631ba73f9f544be

      SHA1

      e3e62a5723f49ea18b64df24896ff049809bfc84

      SHA256

      2420d4574efe27a82ac0f04e300adcd61a330c7f980b7f6e2380aa816d5bec45

      SHA512

      38ecff8baea2abf09d7ff4df742ac4ebd52efaa7c5ff3b00808178e7caf64f0f37c0167e9a36c6da28942fde1c00ca9b0ac3297be66ac8d1b7dedb4879d85e17

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      61d746761cd48f4c1f40feabd70b20eb

      SHA1

      17f265e5dc2bf9677a534569a95c8e1b9d2b3c46

      SHA256

      2ec4d5494b2c7d1a03d39824b59ba88341c7458c0e492f3b3466e03144565f33

      SHA512

      e8a562ecf4037afd897ae73c5d85860999a00df6f3e4c5256d0795c999bfcdf71753c89737f6d192ea88abe2bc0657e8e07c41ac44f35b2b12eeb96678488368

    • C:\Users\Admin\AppData\Local\Temp\Cab1E6B.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Cab1F29.tmp

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\Tar1F3E.tmp

      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/2652-15-0x00000000003E0000-0x00000000003E1000-memory.dmp

      Filesize

      4KB

    • memory/2652-16-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2652-19-0x00000000003D0000-0x00000000003DF000-memory.dmp

      Filesize

      60KB

    • memory/2652-18-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2988-12-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB