Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
3RamSmash/ramsmash.dll
windows7-x64
3RamSmash/ramsmash.dll
windows10-2004-x64
3RamSmash/ramsmash.exe
windows7-x64
1RamSmash/ramsmash.exe
windows10-2004-x64
3RamSmash/s...��.exe
windows7-x64
3RamSmash/s...��.exe
windows10-2004-x64
3RamSmash/�...��.url
windows7-x64
1RamSmash/�...��.url
windows10-2004-x64
1Analysis
-
max time kernel
109s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 10:57
Static task
static1
Behavioral task
behavioral1
Sample
RamSmash/ramsmash.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
RamSmash/ramsmash.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
RamSmash/ramsmash.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
RamSmash/ramsmash.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
RamSmash/soft2cn.com汉化说明.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
RamSmash/soft2cn.com汉化说明.exe
Resource
win10v2004-20240910-en
Behavioral task
behavioral7
Sample
RamSmash/未来软件园-首页.url
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
RamSmash/未来软件园-首页.url
Resource
win10v2004-20240802-en
General
-
Target
RamSmash/ramsmash.dll
-
Size
151KB
-
MD5
20010fa9bcfe78cd586e1ab41ed8922b
-
SHA1
b871db95f38c0fcc9d472dce0ade0228128b9197
-
SHA256
d0fe1ea7b25d5995f8b2523c6e3386d8cd3cb9e9ae6ceb4598bff9d817957216
-
SHA512
6fd626544f6352dedbc170f9e79a167a2762978c25dbaca20aac7bde4c48408e95daf68d93f3ad941c1154dfa41aa29ac4293e35916d0f0f99c51cc4bb2f4570
-
SSDEEP
1536:dwxqsQDrq1SPWG0D8H2ih+ra/lPlSgrc4+hHDNrAxpAyMWuJ8DdQl/D7kHVYrq1x:GS0SH689SaMMpVDO/T0SH6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4776 wrote to memory of 3988 4776 rundll32.exe 83 PID 4776 wrote to memory of 3988 4776 rundll32.exe 83 PID 4776 wrote to memory of 3988 4776 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\RamSmash\ramsmash.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\RamSmash\ramsmash.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3988
-