Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    31/05/2024, 02:27

General

  • Target

    85bc9316c3a4351327e7a1f1c7f64138_JaffaCakes118.html

  • Size

    347KB

  • MD5

    85bc9316c3a4351327e7a1f1c7f64138

  • SHA1

    7af448433b496c62c9e561a179eaae52d0eace28

  • SHA256

    75c49b127ca2c6157597804cca2fca75fa5266d20efbf68ee61d1a09069ae40b

  • SHA512

    70817d5b76492a06c13a9188d595f516a21c41162aab8d3a19448665d46f83a706a7712c9e9a14d26cb3fda20d75795ef6498e37c5eb81b4a6e944b9a73f21e9

  • SSDEEP

    6144:isMYod+X3oI+YNsMYod+X3oI+Y5sMYod+X3oI+YQ:g5d+X3b5d+X3f5d+X3+

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 4 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 7 IoCs
  • Modifies Internet Explorer settings 1 TTPs 40 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\85bc9316c3a4351327e7a1f1c7f64138_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2612
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2572
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2040
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:3016
        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
          3⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious use of WriteProcessMemory
          PID:2944
          • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
            "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1612
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              5⤵
                PID:2820
          • C:\Users\Admin\AppData\Local\Temp\svchost.exe
            "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
            3⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious use of WriteProcessMemory
            PID:1640
            • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
              "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:2936
              • C:\Program Files\Internet Explorer\iexplore.exe
                "C:\Program Files\Internet Explorer\iexplore.exe"
                5⤵
                  PID:1812
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275465 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:776
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:6304771 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2964
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:6239237 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1692

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          bf9b60d43e7e5930179db3d0250cbb69

          SHA1

          65195670a4897ec346c072bfbf618c28b42384bc

          SHA256

          f49b7c946ad4a69c087311f4f224749e1ebf6cc073a9d21a1c6b50b620775512

          SHA512

          e7870882a78ed604eee95135d38033da406294e50e97d1bc4667eca73619362ff30647a7c7cb06060dd7c366d4a97f53b5c1698941796699615a09e354e456ac

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          875d856af1ffe01c550ba3afd033f920

          SHA1

          7e37247ebcee4557a5906973c6bb24ee08a9eed4

          SHA256

          24c150c6ae284985e51a085b3d7df9c5be468bf5afafbe9520a30267ca7217b7

          SHA512

          d55dcca778eacb7a62ed3ac948dd2ce4728cc497ed09d1cefe657fd8d18d0473a9c99281b27fbd29d84e496859449fdadc4dd7ea56a2247b66ad0cdaeec417a5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          1b1a8b25c3a5dcb54012280dbbea58e3

          SHA1

          d8486bc344e1578ecc0c446cda0c9aaa8331da44

          SHA256

          564f9792a9014012eb18c2ba27692411bae8d05002a9465a0198c2a54df6c78f

          SHA512

          8aaa8cf684a84854b875ddad66d0ae794732353e8aea02a277dec8465b6f1b20b8aee29f272c8f30fec2e853bac20e0fa1776875a907dc866c1b7a0ec287b9ba

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          0889934319f85dd38a1a097d126403ac

          SHA1

          f557461da356a7086288717b9e31d7e3f5313655

          SHA256

          94632a6eb8fed99e27239eb7b4147a44b14d16055021e4ba3dff0ee44c74c0e5

          SHA512

          2e3f95ce50de9c84ce0a23f358def3b932ac828904045b075ba9279649dab0d48a16ed4aea8429624db5b8b39ca15c409f1e0997f592c9f153543dd7197129d0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          aebc8cb816f1238b13b9ea6e1c36cf67

          SHA1

          997c3d85a49c25c7cba1f4cdc4411212003e1fdf

          SHA256

          0d7c575654c9a3017215bd2321fa606b4e98caa982c284accad48beb9644d8b8

          SHA512

          aa142c8bcf567d655fc7d4ff510faaa2875b7a9da4266a56c8c1ec151975f98d59cb76b885bd2b4895e0416d60205bb55afc8fa1d883bbb555ef454d39fb8f98

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          4c96194770b535d11f586d64dae8afda

          SHA1

          33bafe6a5ce6c9131ee5d3adca1414d534bdeecb

          SHA256

          78000f76128b73b4bde802c12a6c82bf16f3a27d6040f60ae128aef34dd85d9d

          SHA512

          8a808d5d02621f4aff87f04b18ccca40ee6651392079c84577badc0d1affb9b975385c5a7289ba6923501e451940c9d60856463ca2ec7cb0c72c17bf874184aa

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          7d9913136c0ea7e084b2224e0acce13b

          SHA1

          ecaec91f44c461e7814fd7da02bf971ab18b030d

          SHA256

          014e0cce384d1a6f3a39de781f1fb401b4c26ef499ac3aa29ad384db8a921f5f

          SHA512

          5f158da32057738b8a70a13d1098209bab51a21015dc463acdbd4417b9ed46552affa471a17147f71a26067ff2bd32944523200085a8ced5b98854f624a2214b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          071d25c46927d8eb545a3f4f9e2af830

          SHA1

          29f5c1dfc164086570b61cef5e5fa3a67238add6

          SHA256

          16ba3bf7af7e631af9e97295579a1c98a01f4c48a48f8707af4f69d5a3929f2b

          SHA512

          620fb7d93fab2a1a8601ea9c0518a19b9209d5261923be93a04b119e9305390e0eb324adcd07c514fcb62b90a82c9c022538a56c375689fbffebf08e0ff7ac27

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          cbca9c607022cbb50ba81ab280f4d14f

          SHA1

          2815abbf11705f181ac932e1f403c9a3bdafbbd4

          SHA256

          3fb6ad584fcd2a39e06aa1a1c7a0fd0e3516ccd7ef07710946b94eba753c3366

          SHA512

          29db4f55476baa4070a65440da83a7754a09aedd5d6215c4427857612c904899f532990496b880cb7ccdac2445ab6fd50f418669f3bbc9e28575ded911847438

        • C:\Users\Admin\AppData\Local\Temp\Cab2D3A.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Cab2E84.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\Tar2E98.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • C:\Users\Admin\AppData\Local\Temp\svchost.exe

          Filesize

          55KB

          MD5

          42bacbdf56184c2fa5fe6770857e2c2d

          SHA1

          521a63ee9ce2f615eda692c382b16fc1b1d57cac

          SHA256

          d1a57e19ddb9892e423248cc8ff0c4b1211d22e1ccad6111fcac218290f246f0

          SHA512

          0ab916dd15278e51bccfd2ccedd80d942b0bddb9544cec3f73120780d4f7234ff7456530e1465caf3846616821d1b385b6ae58a5dff9ffe4d622902c24fd4b71

        • memory/1612-30-0x00000000002C0000-0x00000000002C1000-memory.dmp

          Filesize

          4KB

        • memory/1640-33-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2040-19-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2040-20-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2040-16-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2040-17-0x0000000000240000-0x0000000000241000-memory.dmp

          Filesize

          4KB

        • memory/2572-9-0x0000000000230000-0x000000000023F000-memory.dmp

          Filesize

          60KB

        • memory/2572-8-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2944-23-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB