Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    05/06/2024, 08:14

General

  • Target

    979678e2b3759531f4d4ee417142d035_JaffaCakes118.html

  • Size

    246KB

  • MD5

    979678e2b3759531f4d4ee417142d035

  • SHA1

    2a3aec4b3d118dbe9de0c99fa8c210c20dc6374e

  • SHA256

    903b04bf2829c7385734ca95138f4e2c238d49685dcd6ba5b51723e3182c4afb

  • SHA512

    0e0cbd53de82e6b1937eb2733a5ebe4f8c8faa3eabfaa95a00d0130fb8cee1ea00b6ced4db48bab8bd964d9ed37663a33ae46c82c12803a48daa6df178155dc4

  • SSDEEP

    6144:vbQnsMYod+X3oI+Y+hq2SsMYod+X3oI+Yx:vbQL5d+X34hq2Q5d+X3z

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 3 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\979678e2b3759531f4d4ee417142d035_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2200
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2200 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3016
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2656
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2456
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2092
        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
          3⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious use of WriteProcessMemory
          PID:2672
          • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
            "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2500
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              5⤵
                PID:2412
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2200 CREDAT:275464 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2628
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2200 CREDAT:275473 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1576

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

        Filesize

        914B

        MD5

        e4a68ac854ac5242460afd72481b2a44

        SHA1

        df3c24f9bfd666761b268073fe06d1cc8d4f82a4

        SHA256

        cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

        SHA512

        5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

        Filesize

        70KB

        MD5

        49aebf8cbd62d92ac215b2923fb1b9f5

        SHA1

        1723be06719828dda65ad804298d0431f6aff976

        SHA256

        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

        SHA512

        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

        Filesize

        1KB

        MD5

        a266bb7dcc38a562631361bbf61dd11b

        SHA1

        3b1efd3a66ea28b16697394703a72ca340a05bd5

        SHA256

        df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

        SHA512

        0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

        Filesize

        252B

        MD5

        c79629ebcdbcf17a0849b16933b08b81

        SHA1

        06241ef5919ff852ccebbe5d0e2f6f0028ba1e35

        SHA256

        7f298ab49562ba07ff5ba9f19ec66cbe44a17959c3fb4567a6e7523ae273a876

        SHA512

        e66e2f694cecd91f5aafd918611910ee6e1779e1ea8f6676e6c4485fed84e8e55812c7ffb5d26813bb5e3c96f0f748f06c19e91c0c724a0e0ab0323af7f35b42

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        304B

        MD5

        c26828b1897275f184399946e1d0efef

        SHA1

        78519dd42589fcc60a612b306129c6a597ee0392

        SHA256

        730de5f85790e9163ab401457aeffe280addac83f20ad1462bebad27ed5d2e4c

        SHA512

        c454949383c60eedf6668edcf26511642fc959a306f1846c26f7a057bcd9bc3a218bf82bfb4655abf8095bf74dc40840948c24337236f2ae748e037d8f12694d

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        304B

        MD5

        17657cad5cf62ad19b1e947e0fb27815

        SHA1

        71aa0c7e0ce32d4b85a4af109d1bda3e5f2dce34

        SHA256

        95fd75bd0fbe9ca7dc3dabb5f9db70ed823d8977a6694df46f0a87b620516f14

        SHA512

        949316e7cdf631283c5d93421f491cb2d36f23709cee2cee8166569a46224a144968f0e65aa7974803c58a15273ea66d53e09bf60d35fa3c8d89530fc4e1a173

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        304B

        MD5

        f4ebbd3506f37fc383279e054e2a53c8

        SHA1

        bf48300d8a34d14932b8ac51ca78df4302b583d4

        SHA256

        c8ffbcf2e7257fb7f26712f3b2b1f8126987b73453db3e9c920a66101254932d

        SHA512

        9bf47e9fd2be8cdc20c892cec7fa3eae67abb8bd20f44d905f25b80f1e838bf0b8a80d973642d3e37ddff41da121c5e37154082b7c330759113867f13e811ab5

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        304B

        MD5

        7578222b867dd78eb0ede27b3922e2c1

        SHA1

        f73702b527beefb8170050582d2c1a09b5ad910e

        SHA256

        16c237387fd6ecc2c62a1017a03024b5db6867c54d6f68d6f6fd8408bec46d1c

        SHA512

        eacb1316061c95deec1e8dc30030f25d9a0c2c30b583ff5b33a607558f9802667e678c85755ec09efd9c73380a96cb978430c3b27b95d793a88de7a9cd7e41d7

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        304B

        MD5

        ed97136c40cd63bfe54f236b9209f4e7

        SHA1

        e62a40eca67254e51d7734211d2dc9133f3ca1b9

        SHA256

        e1a546d10e856d9b00b08092dbeef0a86bd890b7b0fe2167535239ea92f17fd4

        SHA512

        e6a0cdcc33e69f748df93f5041c0d138648d59e70f876adae9acf47d299465e9a19e9abf50f698749d5fc5aeaf0fdc489faa87cf30db4dd7d64bc071692dbc01

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        304B

        MD5

        d1a892244a5b0cfe16fa541c3c23f8b6

        SHA1

        f1711348b2c090ff7fd3a5db8c18e2f79ab722c3

        SHA256

        636d989649c4eeafb732b9016b443a8ce5d5be1753d283984500932750dce180

        SHA512

        85dba929997e8008676ee79bd13ae2ec0da2b5722f8fffd80601ac3b98b51e87aee017148d54f5e5fca1869156eccf1de58b90e75c822eaf4d0663adbadb25a9

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        304B

        MD5

        93d1c4cd5d0dbba4e557435879451450

        SHA1

        2053f9c033ffefd6c9406f289dd2e1a8083a484b

        SHA256

        39627de82769db7f96c76f9cdb1a074fe9db62f8358e0a51c1fbb56590aca89b

        SHA512

        46c178bc19dad3a7b0ee3adbcc83c0a97a40e117225ae2067ea0791974286ddddb15f5e90301d046672a89f274c9706258396c62bedf833edb933f3d3e7411be

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        304B

        MD5

        cee103d6af244226b6373a60082907a3

        SHA1

        e6a6eefd42ebed7cc246bbb076a2d4d916004efd

        SHA256

        59d39d0318bafeb483d6699782abaa0bb628b351cc45ff9e3b0cf86053979391

        SHA512

        520854572c71c8c3300b1074edf7011285b8e5e0f46d3371db7d6f3c48d871c806d78b702a7ced3a64636eaafdacfe6fb6d6f3b465b31115ae1e8626685733dd

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        304B

        MD5

        8077e72eb9143a4aa04ee5f9318975b4

        SHA1

        46488fad4eb4d63fbef308f7174230d8c00bedc2

        SHA256

        e5251998adde9012fcbbf9ae57c128c54d4a82da79c3e418d80d7c03e3c86506

        SHA512

        27764d83f0012569fefa95c8e731c45a59a96bc4418732c33f8a897189a4f6c3b0dff61e1eb9f9249f11416dc0b31d843db9e9849befe1a7c8e0304ed117bc8a

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

        Filesize

        242B

        MD5

        e26b573cde13884a99dd68fc8b8514ad

        SHA1

        59ebeef043991a238363cc06dae99b3e6d4538d1

        SHA256

        8e6746c6ef6e290b8fcbe99cadedf2beb950073a9d4f0d2885437d6e5ba0f805

        SHA512

        cacc4d79d149050d2361562da4def74b3b440b74282172eeb1a6d1698240ca4666a4be37f9b783df04ce0cdef66a32d1f7fbf70727a18daafdd151d0ccf5f29f

      • C:\Users\Admin\AppData\Local\Temp\Tar765.tmp

        Filesize

        181KB

        MD5

        4ea6026cf93ec6338144661bf1202cd1

        SHA1

        a1dec9044f750ad887935a01430bf49322fbdcb7

        SHA256

        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

        SHA512

        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

      • \Users\Admin\AppData\Local\Temp\svchost.exe

        Filesize

        55KB

        MD5

        ff5e1f27193ce51eec318714ef038bef

        SHA1

        b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

        SHA256

        fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

        SHA512

        c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

      • memory/2456-17-0x00000000003E0000-0x00000000003E1000-memory.dmp

        Filesize

        4KB

      • memory/2456-18-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/2500-27-0x00000000002C0000-0x00000000002C1000-memory.dmp

        Filesize

        4KB

      • memory/2656-6-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/2656-10-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/2656-9-0x0000000000230000-0x000000000023F000-memory.dmp

        Filesize

        60KB