Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    10/05/2024, 09:34

General

  • Target

    2e7b2f75c0b28e923e607d4209c5a215_JaffaCakes118.html

  • Size

    347KB

  • MD5

    2e7b2f75c0b28e923e607d4209c5a215

  • SHA1

    59227050f68ed48cc81d503794d692becd47aa5d

  • SHA256

    f23875e8af10f97052def1ef26200d30de054f28c57ba788ac884000737a67c9

  • SHA512

    570e5df02c95edbae6eb32ace69428ce64d75c14de725ff88e8d7d11ef9f4a6e5bb914e86fe785245ebada246ae610bd173079a061be4e9ef26e012c1adff017

  • SSDEEP

    6144:JsMYod+X3oI+YSsMYod+X3oI+Y5sMYod+X3oI+YQ:V5d+X3S5d+X3f5d+X3+

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 7 IoCs
  • Modifies Internet Explorer settings 1 TTPs 40 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2e7b2f75c0b28e923e607d4209c5a215_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2476
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2648
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2808
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2512
        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
          3⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2788
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            4⤵
              PID:2684
          • C:\Users\Admin\AppData\Local\Temp\svchost.exe
            "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
            3⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2532
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              4⤵
                PID:2672
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275463 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2592
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:406535 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2576
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:6042632 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1520

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          28c274c9a798a5a3bbf0dff194e37e64

          SHA1

          355ca4cfa11390f95a1e407d1f68140cb5d31881

          SHA256

          5b082833e87134b1515656d401ca52cd717c6a0fb95dbd16a1eff2db78577977

          SHA512

          4b971d6f670d5d2e3ca4f39c58fd52822f7f7aba8f6a6af0d0f04a6eeaf6e809ee1e4f0a7ca6cdac7ee7d688f031800cbf68da353e562f75513df5ffffb12dac

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          d8c38a8ffc50146512a69d5d1480300f

          SHA1

          0d73a1191c23768df78231fe69f2040dc77699c5

          SHA256

          7da5867db5e592cfdc1b1b03263e13ae5988b3411c57010b0be5e7d490438e36

          SHA512

          62fe08591f3b711fd54ad8a53ea0e3bce6593d7e4fba97354508f5d5df26357548c7a60fd965d4a4e2d2355f1b5b6b1c0ed293fb3a0672eb0a7bd4e661c923dc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          4228bf635f0f8708c33ccb661029784d

          SHA1

          7113ac399a26a16e6fc276854cc94a347b445fe9

          SHA256

          88b4bc783871a30d5133848d66594441a23a641637b22e83ff4385b8b981b3f1

          SHA512

          e529f5868ebef68af3abc1e3c42a688bef87124ec632e6b9fdeb7a855ad318775abe7bdefc993f846cc761a85418ab3ba8f3b71d4c6e58a26d3abfd7271b5c9a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          a781b63a908d63711db784792219fef6

          SHA1

          7af1bea085c494669b25e6d51372503e8486d123

          SHA256

          f145608673412a93a5a198f99787bc3e8a46a5377fb46360e0ea43cbb06c16f2

          SHA512

          3808c8e09826e01b943c79aa36139bb3ac698cbda5ea673d03eb34a5ee072ecde300846090f3276b0092981897803751b789ff61d5eb3777bd12e1aa71819fef

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          2a6b381b82da80417201fa6bfcaa572e

          SHA1

          522021146ee250313c14cfccc167ea0d4fd79fd5

          SHA256

          7be295034b5a2e26b6c6bf7083190737b8022020838a9eeae843e9fcbf24e9af

          SHA512

          8c05683c1a3e014d16e381358b2fbc1fada80a0ec2e40ea094d0ef3e8e34a62e5aecd93e19d58778d919263f4baca2495a9b17daac28f99852ed46071593ab19

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          556f050158eed8cbb32daba37ea0a111

          SHA1

          28ad340d44d15f5f2473be030383b517409dfcd7

          SHA256

          b6c329843fe76ef1a4d005b648ee4738793712671a02c652359c3dbcd4f70233

          SHA512

          466511b9558bfc093db5eb0be44b6b521fe88f34bafb8d695f3198f97ccdcdc3c5647a8450947359d5a9903d5266fad1c3ab8f5709c9aff22a8d17e94241e524

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          56c75b4f6138c6637bdc54aa5665be25

          SHA1

          363a8619fbefe5d1405b92b751c38a47655abe58

          SHA256

          5d0bfb03d0de7e2d63314ee0146820a3d14e7d5891c5c2513f91886ad38dd498

          SHA512

          7fd68ead2e11bcad13be1386bab5b8c08c75d2f5ee2360cde5c1822e16ab85b3a06c2d1cfc8b98e10620dc282428477e0185d2d02bef720984f2ef6d9871fce0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          8f09a164bd95edb860f38f9e430179e5

          SHA1

          7273acfc5746ea9ec62f2a6bae0cfb469dbc899a

          SHA256

          6bf1f5d23d4305c1a82e74dfd93d616b834e2dfb519950d94a2f4142e75ca70f

          SHA512

          c0b42ffb6e8e1fd18a4d2103b5c53b4b0addb921e8900d67148cfc64089cd7e478207fbcd6e75c6f47878caf87259c979814f9b2f91f7c503e696911a329c1ab

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          8fb2a85d058aeae43c2a2479edb02c9a

          SHA1

          157df87e61ebeabd6d6e837d264bc72e94011888

          SHA256

          267785dd6683033218616887a4927eee6603ef415019be6594e4ca1c201d1cde

          SHA512

          6a4764016f02cde53ff4bd813e8c5a69258f1a5e2f59ae3b49ae257f19b8a6cd5e2d63d73fcde360ba5a5927848e3843a7c99ea41b129e5b47e77f96c5d455cd

        • C:\Users\Admin\AppData\Local\Temp\Cab2AC8.tmp

          Filesize

          68KB

          MD5

          29f65ba8e88c063813cc50a4ea544e93

          SHA1

          05a7040d5c127e68c25d81cc51271ffb8bef3568

          SHA256

          1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

          SHA512

          e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

        • C:\Users\Admin\AppData\Local\Temp\Tar2B1B.tmp

          Filesize

          177KB

          MD5

          435a9ac180383f9fa094131b173a2f7b

          SHA1

          76944ea657a9db94f9a4bef38f88c46ed4166983

          SHA256

          67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

          SHA512

          1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

        • \Users\Admin\AppData\Local\Temp\svchost.exe

          Filesize

          55KB

          MD5

          42bacbdf56184c2fa5fe6770857e2c2d

          SHA1

          521a63ee9ce2f615eda692c382b16fc1b1d57cac

          SHA256

          d1a57e19ddb9892e423248cc8ff0c4b1211d22e1ccad6111fcac218290f246f0

          SHA512

          0ab916dd15278e51bccfd2ccedd80d942b0bddb9544cec3f73120780d4f7234ff7456530e1465caf3846616821d1b385b6ae58a5dff9ffe4d622902c24fd4b71

        • memory/2532-29-0x0000000000250000-0x0000000000251000-memory.dmp

          Filesize

          4KB

        • memory/2648-16-0x00000000003C0000-0x00000000003EE000-memory.dmp

          Filesize

          184KB

        • memory/2648-8-0x00000000003B0000-0x00000000003BF000-memory.dmp

          Filesize

          60KB

        • memory/2648-9-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2648-6-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2788-25-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2808-18-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2808-21-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2808-19-0x0000000000240000-0x0000000000241000-memory.dmp

          Filesize

          4KB