Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    129s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    04/06/2024, 07:45

General

  • Target

    940ac469d0333c7088d789dfa0614971_JaffaCakes118.html

  • Size

    155KB

  • MD5

    940ac469d0333c7088d789dfa0614971

  • SHA1

    7c58eee0332e195e975d000e80f4ff41c699c9e4

  • SHA256

    2c5d625734ad541b783df861c64bea2948ed08d6566ec92948c1c7f11e31090b

  • SHA512

    e68bd33cf2cb65761b539810e86279891db4bbb3816776796265a219a663a1e27d479791811e8b8825e9cb0f8ce2a7b42aa4aa4b105b7423f2bb9a0d5435d3cf

  • SSDEEP

    1536:iXRT1M6dWZDN9ofrUnyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXAZ:i51YbUInyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\940ac469d0333c7088d789dfa0614971_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3012 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2556
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2176
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1708
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1724
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3012 CREDAT:668677 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2880

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      814144a826df6bc7309b65dce1e0351f

      SHA1

      2882c76f63f1fc8ffc5f4b7518ad8454e843ce4f

      SHA256

      9e6522c02670385011cc7527b73f89a1510caa522c802fc1e886d6f077e79a29

      SHA512

      f7fd52c33cdc2e659b5654cae20bb06ac1603dcd990839eec54ac071bed37f423053a3531521d3d6027668aefcf880725281ca52f56ba7ec270b5815196c9960

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      856e3d640b16c1c070cbcaf5b682cb0a

      SHA1

      db74b8551ec0ef737d8c2451eed81d249e631810

      SHA256

      2a37ff3a4e0d31a108716043ea64c35841c09661995cd390050dabe5c37e6722

      SHA512

      75bd3ad407e18b5082feb49d5730d6f338f6bbd4e74939cab5aca095f5a1624e3fe2e78df4aa4c4438ddbe23014c09fa72497f013cc1efb7b93087578992ad5e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      65c127232474ae74fa728405570365ac

      SHA1

      134746e01bc535be0dc19d8fb77aeea655d5c035

      SHA256

      90dd143550a603c1181fa9a95fcdbb854b63e57095ae9c4dba6bf8d9d20b5c12

      SHA512

      390e957845f380f1b239880f9a4a684f221beec6a5ae6e6e1bad92aebd146b4f1c11c79cbcd52079d526f79d871d3ae0b8113f938a975cd8decedbedc14309a6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d26b70eb23816951719f8ca821cbe0eb

      SHA1

      f342512a40b58808d3ac172b0cdccf7d01e5c3d7

      SHA256

      de730d0fdc6a2f2632b4dd4d4725d34a7243b198624c8417899bc4a4333115c2

      SHA512

      dd3da47afe09e9f101ed1d7d932b19a7a0afb939f27d6306b887d8727f4be2a7adf6ac5b7504815760037021dc2eed6ba68f28f3182862d67563d6d28b1502af

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e3a62a682c4b14a32a64797a4cd86b37

      SHA1

      1285579a005974d1a2d52fb88cea24f94baa2da5

      SHA256

      0a0ca06e6caae2936e8680745bf1bd6d4113db144efc98a2110b3432da9ff4b1

      SHA512

      2d069cbf463042c7acd0c9b724b0fb7229acbc4b0b5dd23c39950bee465c97c9f621ff154ce1d9cb3af72292987108a328d3a2c26ea9dd4f4f6776d2be6defe1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8952ecb36722e2e47eb8f63eb7341af1

      SHA1

      0d106e8398d43e365195394bdb7a7c127c6eea2f

      SHA256

      769b5e6c06039d2339476bb80f9ab755da9cb12091c2120043e2203f043f3a2e

      SHA512

      f584865fc35f00be55462d3067e445576e9c347848ac327d1fba8f45f1c01722ef3d054d3cdc631480f2e5b8510df3e7085ac2099bdbbde76be6e2bed7e44faa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      186fcaf31543b2a7ca7dbbb89cca0df9

      SHA1

      37949e4428610206458bd4240829acfa00ac1894

      SHA256

      1166f6f077d69c295dd83508568705ad16a22685f647de6e03bac0fd736e6ed0

      SHA512

      8352d204590fa105345e2d880621ff3c8433778812c4a11db9beb87460e1fc07b05246395b692e2096a40881a7cb31b2327d3d880a499bfc8b4857589191a2ed

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      65e7a5ffb09b8764b9259582cbd7a0b0

      SHA1

      8cafdd98985c560fb549519e11967bcfe78985e0

      SHA256

      b751997b0a3b82a4a81002e0492d35312383fd50261c9fde80a1c3d00f34c2ca

      SHA512

      48f5863bc51b7db7b64b239ea4adc19255a334fe38e7843ee9479528564a0022024680c911f20e786e749e13d8aadbd04b8926bb96fab19de7cbb65c5c63eeb2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      bbd88c14d757c4863c1b738aa25d630d

      SHA1

      048a6039e39f0bb1f2e5fa9300eb495e00c96130

      SHA256

      2174124c4348eb51bd4e8c8251834ef449452d0f87cdb36c4e64f996b30af442

      SHA512

      2ef6dbdb76e15c085cae9db9106703983a57355a7195f59c4d456199e2c86412fc047415af45b3e0b3ed490aeb3030012f5e86271047beabaa18444658daf2a0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5142aa1150b4a8ab1d97c6e9ee4ce662

      SHA1

      2db4ece7df287311be404e98c9359462a77c5d31

      SHA256

      32f7e084e298c0545394ba22c4716ceeb9666d36a01a8107bae109b31bebbf52

      SHA512

      86e90201e56cbbaac6f6d5f954167297c3e9d58521c545c17c11c3f3d780397fb220bc0aa51725a114486d7e4db9b287726c61909f2aec5ac17ea7185e595709

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1827d6e32b4455465399c56fc2356c7b

      SHA1

      e8082c0005c4562c1db3c0eeafe1a6216b7e92cb

      SHA256

      8981d5110f0869a2978f3ea088247998b0d0f06b6f08506f46413ea78c3662d8

      SHA512

      d3ca1f2da5be1393c08dc54d9f29362637d4b639b642f7c0c5f94b5d1531040833990fdbe2e55f1f84dc3aa10d0b4fc81d8f3fab96a083d56ec3d49a163e4074

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      665a5685cc7b9c7ce7299a3fc9a896cc

      SHA1

      a9c1edef9d2febab11feed87b9cccaa63de72307

      SHA256

      04a4a3d49d462afec45605d42bf450d5cd380a308c858dec11b3156f620877f3

      SHA512

      a98185950cd074b9fda2b355711b9452cc048d2ce7c49aea3c498c2d621cd6b6c3d17b740708081654cfad4338c8e0aca15206247c0b06447e45ff21eb90aa7e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b8bb2880d8f96f55ba737ee5f4307ac6

      SHA1

      405c1e486602434bad848251da09ce4d9228cb83

      SHA256

      7c95ee32432cbb8c11b855a534970db6863514bc7fd216ccae3449a33f2cd5ff

      SHA512

      cf13cba82c6ac0e87b1013054f58e5cef06dff0073d3adef6fa66798121641a1fe295216e8c1aa7f210f04022fce80dc637015aa9198e36242c5778828ae014a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      25cf0fd62ef6e972ae4b45d6615ba1e9

      SHA1

      ee75f6c54479816dfb9760e1fc88cd66087d64a7

      SHA256

      3b8558244d06d848fd9a67f945db6a89210e49df4c8b45212fdc617553f1b7f7

      SHA512

      e4467f3c00dcf82e101861e6475d896fe71f4d6bc81fd02462cfe89f9b104d79a4ac3c2c70f6176e2ce914866565961ca1fa628f3f51338f8b62f89a9af4338d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5013316d14e5eff671fe6c8ca467ad7a

      SHA1

      22a90993fd244c784716129d244837a3aae72e2b

      SHA256

      d7cd8ba82983bcc974ab7399b2faa29d4accf0800f6c28efc399fdfc33875e2e

      SHA512

      f85233829daa3cb9dc71569bc0a448f82493250f954cf061e469cb6b78ac02f2c6285ecae33bfa9ef1b8758158be715b57a1348b85e3cbc1d0a917056c0b5fdb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3be3d6b2784668258eb6bae7475991e6

      SHA1

      4f9203f6b3c306208f521c1c84abb468a21bc8fd

      SHA256

      4a00018cce7ee8bbb9e70779815557f737240b8dd5333424ef0a20ae35b4a11d

      SHA512

      833a907b541e80411e5555864631b2932cbd93bb42c2ea0aac6b729f50061e50d6d7d76a6c1f65bf55383dd0277308d33f028d14d2f71743530e4d56107ac066

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8a90b8d9fa2f4e8713cbf1f443b1d80a

      SHA1

      1d1a649f8e61447789cb87effa789894ae610013

      SHA256

      b6829b6680c7eb899cc22c1c54aa61e5776fd40561ba2597b5a355ad9c8297ef

      SHA512

      01484266bc66c56f60b9031048e72a1a926db14de15c2b5c3fee5f645c47bda6f45f3cb5c62fac004a9611423af1149074f4f5362b3b8799ad989bff6d518f46

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      cf261eaa2362456ebd9c49a5662bf330

      SHA1

      8160c7570d238b69cc918d9256aaf2785520c670

      SHA256

      f0f81483734e039addcebc366b9814428d0dca9810bfb409523396a1aa112f2f

      SHA512

      5d5b3fc805eb75059cbb429cc5409f77e31f80133f740991bdefdec19e8ea6a064071da877370b4b6c9c6263bfa51c3b488c115724365f45fc4a604b19392670

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      58e665bcb44c2014ae3bd9f5d5120edc

      SHA1

      66e40840227ce97c0c4e7ae3c7152ba53332453b

      SHA256

      451cf369a8ac3e37934012a94995a3b5789668231e605012e3110ea168016dc8

      SHA512

      0617d7b5b3b03523104f375ba83eec2f5fd914b52992d826ca3a2290aa3e8dc2732c18b3c5e91a1c5228fec1b3ce9859e01eede08569d3dae3a85ac28d013f2f

    • C:\Users\Admin\AppData\Local\Temp\Cab1289.tmp

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\Tar131D.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1708-493-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1708-491-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/2176-483-0x00000000001C0000-0x00000000001CF000-memory.dmp

      Filesize

      60KB

    • memory/2176-484-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2176-480-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB