Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    133s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    15/06/2024, 16:56

General

  • Target

    af7161860a65e03638941f3ed55d8173_JaffaCakes118.html

  • Size

    134KB

  • MD5

    af7161860a65e03638941f3ed55d8173

  • SHA1

    878c5c0953d0d586979c36a1c325110f82dea9b5

  • SHA256

    a941b7c84ebf5a9825bc2b4fd0e973adc58b11650f2f46c7b9906c3c211d5f61

  • SHA512

    7da9fad71fc3e571ad5ed96b54c5b8cb7cc54d6b2ad3ce5054102f6266d79b2dddc91fc6edb68a3d2dace99144718dc7fc0deff5a0c274752f9a5429888bc221

  • SSDEEP

    1536:SjAQRbOLEQxkyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusG:SUxkyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\af7161860a65e03638941f3ed55d8173_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2108 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2304
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2660
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2780
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2768
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2108 CREDAT:5911555 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2800

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      00e5c96639a8bc1db0230047a4a16851

      SHA1

      046d5a7314ed088fd294a1ef84d20728d907f0c5

      SHA256

      dffc9bd0308bcf8e0418183d265cffe14314f4c978a3acde77261b662ace3819

      SHA512

      f89798d2ca97611e18608d4f56bafc5b5b34efda70b5f9b5617e51c83d4cf9183d1ad6f5ea77f300e30e5e78f837ce87f4c9573d75d1e9ce51a982cd45951772

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c8309dd22d2ffe33d85fa3c53cd85702

      SHA1

      4e4c9fd6230c217bc1edf27c6390f6191fa783db

      SHA256

      9d5077f5d4277879f8aa6532b8d575704f2dfa3c04ad8d49304cd55c2721472b

      SHA512

      13e8ed7f69639200cc20eb2dbcc4b3a13176410e73a42d60f8340d434c1d9528084c1936eafd3138fc6b7b29762b9ad75f8137ca88e763a99230ba03ffeb772e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      cbf87fa23752652aee21fab8c0403956

      SHA1

      40751d9e7d6b3f4492fad53c650509cba5104ae9

      SHA256

      0f20632cf5225a3e22ffa7cc799828ce75eb12ac57ffbc80f6858837011ac773

      SHA512

      7edf7b6e68e8d82bd244b0a34876f2fe4b607c8096d214f5f08da7c73f828101579ec59c7e681bdc0e8bbefe35bd52e604790c85265f54b248307cc2e59ddb78

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5fff4dfbc7ae8a7040fd4d1a8d69bc42

      SHA1

      1992d90ee1cb9d8133b2ceb35aee0834334e7936

      SHA256

      3fb2fca22c55191dd9d6ebd658f04764431da0c4186e84f252eb819e85a4ab85

      SHA512

      8242e32720502b9b1dbdd19f3bedaf9bb64b1d9d1d10e393bb5115c8c3998fce58b915000457e2d4de357fec80e188d67ad750431770c6bdcf9b5bf3518af6b5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d3bafbca15f1fe334c56e35f638dff47

      SHA1

      c0444949d201b4b55985774c35cf37cbe8aa1deb

      SHA256

      f326bd30ad385fb3734ffbc41e63af48fa1048e2992a60ce2b32691be5fc2531

      SHA512

      b2953293f4ee0154d16a5e3b3732e85cc832d5a1d7f9872a77e3152c4522b6cea4789a85aee22116c86707cb64a949c5afb31498b9550b5847f22202c70d3c31

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f529eacd40581da735858e36f7667fbd

      SHA1

      1538684624958315cfab2df732dc499343eb231c

      SHA256

      fc04caae52e796793f93c838e3892682ca177d7446f615794c43bf14482810c8

      SHA512

      a1ef9d783966ca1c3434f388b3b793ba2067fe70baa1bb23f115370b6e066b3681e234cc397faa6112266c67031797539091e212b1fbded1b4d12f2baca32414

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      203c359f9c1a4b5dbb916f1d65ad4068

      SHA1

      cfaa32078e24e3d3c57ddcf8a296154e573cf2f4

      SHA256

      b3891d6fc7d127740b9ec7c5179817b10599283bb89f272efdff83669faf9750

      SHA512

      0f0fb884a86232f2afde1a3939b0ee9e3718fa11d0e1cd95d68094c02343883a56915bec9557cd45d334e96a16663d9c9ba48d9f01321b92fe36393901a600df

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0de52ac4ed8bb4b00f4eecc9ff745444

      SHA1

      50af9ca17dc11e560e22cf6ac188273c806dfddf

      SHA256

      592365847cc08b1ac460288a7bf0a1763228d6dfea90a246077f8e21e421972d

      SHA512

      36c0dd7b37c12f5e80abd7a9b01730f967b3a177e50a2c97fbdc1579ec32cccb217f2f9cfa278baa733f72c4c8510361da65408fd54672ddbc0052d36774e12e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e74829049f82dff1e9aa9c9d5775e246

      SHA1

      7c71e1b60f7ca56ac0fbe1dec518b5c3ceb0fc6e

      SHA256

      ecbea2ac323452a66ea7b96e23589e943f86f3a665c32bdddcd95f28590bab5f

      SHA512

      d1d42cf6fb63ea99eea04b194010c0bb04feba39ac7f5d2af7fdd57217183d1cc533cb13a73d310af8a2e4b6a7f7f45beac502dac301170113693549ebfcd56a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f08652318b929b19b65fd47b2d695324

      SHA1

      ef404ba3c2bb3e87709e4abbca0951c258918ea6

      SHA256

      15df2c255e37c42dd73045ff2045cb6bb2fda023b9cc877cc2b62f6cdf58ba70

      SHA512

      b0de1d05ca4bc7e688961b24a65f4f444541a4f656542e991f0acb9e82923d5c5161e541b08f5c878c79bc1d319d40fb7a9c82d7c6b852fbc9694557151afa0b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      59d7a2c1ec596951ebf0cd9482f7d044

      SHA1

      34c368f0717dae15e7bb70ecd3942e1c402c6360

      SHA256

      448cb3fa5d61a504a8bcde41224c32645558325ff1874169060deca14c038fe1

      SHA512

      9b03b7ad48c1bb2b6349173663a8bceb28b9cca4077416648b12a6b8897a0a57663cacf5fdd029e8b3354f516de91d784c6b5d6ddfb5a7fd343f7db49c0501ba

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      66e45e811a3c155c1c955cf618127769

      SHA1

      c4bdbf4fd49894cc64c4b0960710e294593e5a8b

      SHA256

      035153e2fa415e00e514146ca95c1655412f0885e89e47466c5dd058c73380a4

      SHA512

      b1996f9088b332e34a893c68c6b6e7f89720ab4be362ec7ce155e5f461dd8badfc57bce34e2be27f8871e2971870f395a05c11587a8a5272ed0f264ead685aa9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      cf6d3624f56900c813b351378222186c

      SHA1

      e92b390bfa92579bda49b3843877004a8e4fdc00

      SHA256

      74fb40cdf2088eaf6ba2d75ef8c606ea63c1a61f6b4f78133be6fca28c08641c

      SHA512

      e9c408e819901a756abdd3608870db0bac33522d0bbd2fdf91c8f9d31995ed0390f98ca5e19d4251fb573aa3bb5174ed07921dc38cb552dbfeb9c63ca7a1cc5b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      03316e087cf1d9c401951c7b0a5f2e6f

      SHA1

      17704365d9f683f450a3556dccdb16e4f88c8988

      SHA256

      67a7974bf939c9f574e3ff16266afe148962690e0b9c66ff527bd7694d8cd50e

      SHA512

      b95deb56695701931e805cab232a40375db6c35710b8b7375c8810c65d1414ea7f8a505294d9b80da186ff94a6b3473e0cfd9e7bdb58ae19936c8accfd658095

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9625e306a21d26d5ea536029a2f00e0c

      SHA1

      cf03867572b6cf3f7dadc9976994379e65a80970

      SHA256

      bfa6563df542c83be332e025d2eec4b68ce849af83920e6f431c0d51058b4857

      SHA512

      ae5c5a6cd8d51f58a7e2612f736bb8df94076bc148fccaf967fa9c3ab1fb862d7f2688ae1cee73431c1e6cd067b255ad34e265a25fdd2adc736d19b230ef35a2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      78842509019a7f58fa19e15adaa509e3

      SHA1

      11f7faa93844ef22cf8ce2415121911e8700ddd2

      SHA256

      f60ca2a7bed64a5e4ddde2f438d822e4fafd7d4cc60921360f07a0ff2cecd5f5

      SHA512

      b26b23d8a30e66e3eb721191cf78b298accf26cfe62aa1ebf0aebae767fab26ccf6cd137a2f8f642523e91f0ad2189171bd804cc2b7b2a5abd31c828a33816cf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      50b520333c2450ae91eb62def94ddeea

      SHA1

      2e5dabac005de04d5e2f60891b51a0b78f3ce3a8

      SHA256

      827d8a0aa51c23c930139a38f7951e41e0e47df7d1329d2d98783bcbfeb95de0

      SHA512

      7e26997252e1d814f558386df2022fe04822a0ee4e7fba60f1e745bcde7ec8bbd039169097f9035cbdca2cad06947d88da8095850a2dd2a183adaf8146a25bd6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      26fff418fcb3575b23051a5499940c7d

      SHA1

      8a319a408e9e60a1f541f3bd4ad32e5b7f3c8d3c

      SHA256

      55affb5d6608e54ba622519701243e28220fdb622a751c9bcc797eb97f95cccc

      SHA512

      03446b4182cc23dc4e46ff86fdbf3fc19a30b15eab5cf9602d41c52b87252251088574e7216fe46d34dc6cbeb2ff94bd46c5f2db15b565865d14ef7eeb514ad4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4a1a28609e2065bd00f6c7dc39b63656

      SHA1

      0c487be20609ad8276a01c87d7b96d422c493603

      SHA256

      4d882dc64d637ae5b85e56c6a986b08e833711132531c497e29fbf9167ab7c4f

      SHA512

      672f5e334d65b702501494cb9034da0d944cd3060166d0d39275c681cb648da3f95291df4f682e7bae0f73175b02cd6d44b16acb58f911adea485862c7cce708

    • C:\Users\Admin\AppData\Local\Temp\Cab2511.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar25BF.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/2660-6-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2660-7-0x00000000003C0000-0x00000000003CF000-memory.dmp

      Filesize

      60KB

    • memory/2660-10-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2780-17-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/2780-18-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB