Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    133s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/12/2024, 17:01

General

  • Target

    daa2ab832e02a6c9196973f4ea1d7c4f_JaffaCakes118.html

  • Size

    157KB

  • MD5

    daa2ab832e02a6c9196973f4ea1d7c4f

  • SHA1

    f202f7eb4a4d59dbefe29dc1492d0cd1de81208f

  • SHA256

    428e2a11f09fcfc0eff0629cf4f9b40d69468ec2ab4e4199604fa37d49546f96

  • SHA512

    48e0a71d17dae6ae938b18a678d53ff7099b2033a32cb4934fc0f7b7db06368df2e2725cd64b36cc15e631b9ba63e0aad3a1acb475a7729462cc82bbc14feb69

  • SSDEEP

    1536:i2RTR6/bbnn1yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusG:ic21yfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\daa2ab832e02a6c9196973f4ea1d7c4f_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1924
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2288
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1160
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1672
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1788
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:275477 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:904

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6aac99a632dd69ae89395ff218c9d825

      SHA1

      7ab8f0c75109e9745bf8c6f8c470458a6aada870

      SHA256

      d9e31193e20a82783b75852353effcafb01a04bb1a23b4cca33b562aca063aad

      SHA512

      79fdaabefe6dc55a23b0babc87e683a837572a5c9a32589b8e84d182556ef5a6445edc85846ed0ef73ff37d7312a95453445e0e15839f1c800249081e5932445

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b61043199fbbed28303c6e028861ed56

      SHA1

      5173ed60b7ea614e14e930f6515b20e1e0bdd36f

      SHA256

      7ec9d24bf86d08f42e7f5ade7b4e3f0df4b74469462940b2ab3cd95c10ce1a62

      SHA512

      c1175ee7ef10588a3541d5ffc745a38e217674720962252f57f1bae9c95d214022a89b14eea3598daff7b3ffefb5cb01d03f4af7b08766ed45d4ed2762cebd0d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2754d960bc8a9980f727a51cf50acbcf

      SHA1

      58882d59e74ab8ad7f207d82c63c49132b55d831

      SHA256

      0c70834e0d7becd30b63c47c69d80a4313080aaedaeecdc493e9f649f7151502

      SHA512

      f23f7b478c8579898887047e6d22613132faacce56e1f05f448dd739a51f0ae870bf509d8413e404fb87926ad1e19958492d83e78d1a85b46ccb52473230570f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2d5744f81addaa9d5dd91d04ff3be057

      SHA1

      87a6fc80062738bab8bf83c15fed078b1f1eecef

      SHA256

      6c9391d259c43fd67780e86dd5bfcc19e25d829f95cb44e792d2471a8eb18553

      SHA512

      ff437cdff79ee82574ec38bdb845b7eb01bc70e4a239ce718ff9dc527d32f98f62a264fb67ba432da8ce9504fdb074ff8896fcb9d15c0cd44ad502f79ba1a8ce

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8685e4255a24e1bd4eb27fd7fdc7f26f

      SHA1

      691e15c2563998cc6d178f79a38bedbc2a718a58

      SHA256

      3521bd1acefddcf7fe8a765bf4a48367368435d943a44a247e96ed25cfaae122

      SHA512

      dfae9c82b68fc80e49dcecdec13fbdd9f1813235b14599db16fe645f5eaa14bc44b6eb15d496589017098e94e1f5780a76fdc6ba96aa54de7909cbfcd923986b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6671933ef10ddf2e3c6386d239b2d185

      SHA1

      425cfbce57aa317295d18146a1801de5a7821c41

      SHA256

      2004c07f72d25c477a10a74840e5a5988f9172d39873700d58751e96a9c61953

      SHA512

      0275413d82929649537cbc1a9654d67d57413c80b9dc082d51c9f65bd9f6558903cfdb3e02b7895f644426033f2ed8b7c03a581b500b9e8ad4ab45061665aae3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4956196c5372750cbb8b7fa09a2607ef

      SHA1

      46d5c1a862badf8a76a9287496b4923e759e1829

      SHA256

      976543d6c0f82d86788c445cb82af3c50f308321eecc65b54b206908d2c3fc0c

      SHA512

      01238190e657a3592571e810b82d76cac775967739797931eaee2e16efac5ffd7122fef08bedcc53fe44f8079b90bbb43bb7fe3c221b8c0d2ef6218db300dafb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      829dd426ac74164d4e0a98fed13a219c

      SHA1

      082903560f2fe3d9831372995723625114243464

      SHA256

      1e6ca51d1e0d37e2de9459035a4129996edffe9f30ad778e6b8872dd55a35c23

      SHA512

      1e620bd2f90495b1afa5981b79de30a3d131ba68bbaa8c767423bd58cd5da4827552bde3a0831613185bf8fa1dcff646f4d770e573c6b3c06593dc1843724b65

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2ff8f4590ce448917d68694a2ef54193

      SHA1

      56ed041d498b13f573c8de45a5d38141c6f157cb

      SHA256

      f57c9fa6c418cb9e284404515db07a42e74f98e19e4f4ac03ceebd35bfa78e49

      SHA512

      6fb34a141bb25d746993c4ea339e418920f7aa23bf3e49a5bbfb80e95f29d813ce085aa57a336f656b2a19c136108f41c058cc6f367e512b698c6d5b3d54adc3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      97df2cd85fbde0874b2d9d23eda23acd

      SHA1

      8582d0d3b393f0773e05bb8d7513eebadb03bddb

      SHA256

      b7834c9424382044ae8537d5da0da9bc890ef84666468408bb948e12715a75fa

      SHA512

      7c0923ebce2d0ba330e43c9bd9f7d3ddbc331cb6d0f8b3d7faf1e439087570e9893ef773246a369c768da2ec02ca0aeffdc765a5909ea5ca83261406281cccbe

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      04fa3e700b3587e362e0d8183552e27f

      SHA1

      492d9fd4a919fe40990c83c22cad0fb5735d4317

      SHA256

      aa9c43f7edd103ed5cc0b006681cfab053f795465c6e0ead6e7b73fa8808e587

      SHA512

      a1eece4390aaa151953ba01f54bd6f7440a44d7b35a4bdaca4612777cc2c5faa73501e44264d31f05ba62e5f31a06b40f2ee79b56974257b36da1b50e95567f4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6e4176227919f12bf09e812fcc6d2908

      SHA1

      35a913d747889337c2ec65bb89749d81fc74d6c3

      SHA256

      c0ed38f6b914660d2849806edf7a93d8aff5d613fc342cce5ddf45bf81f15405

      SHA512

      4da4aa1d8f67e8fc75201647935b23d8c642630f3089070b25662b6231fdc31d615d9b446b5b57c01767ed17556e7e425de6cb9f496657801a8a77d0af2983b7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8bae21bae6f21eb5798d388bdd5e7e00

      SHA1

      32bf7b93d4cf50959a0cad223909dfc3668abe93

      SHA256

      6d1dffaf8b4bf7616f7d9db476d48a83a012ae74a03925e1826ef499284b4a58

      SHA512

      a2b2e21df448d4ca92cc208c9e007fed536c33ed3a811c761f1f54e12dcc7a648b00594c1a6fe23b85d28b98cfdc1d1c2da822a7cbd56120d61afdc2c28fbb30

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0559c0452d2bcdc459053bea5a6f7331

      SHA1

      d58da4850fafa844c0c71f89413e807050c64f57

      SHA256

      582a4d41adda535c7891e1c3c1b07cf9b0b6b9ea1f40943cc89b7b09f545d88d

      SHA512

      11c9ae943ad98d1444be59a359860dd372ac8be661c284485aa0572a4cf55f416617f19df912ccc4a29b9e84a2fa3c2be15a7e4f914e6e4004ef5aa04b1fbd86

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      81796b6aa688741fa06af3cbf835a1ee

      SHA1

      1540ace1cb6a2d51bc3fde23649437da39dcbe11

      SHA256

      869a79e0406678cb07287753c9c679d72ee7761fb34c093a80323b7ef376cd33

      SHA512

      5b4200b8ff1d0b6ddcce3527a614e460222e20f51542a60ae5e71dae8e94d087fd9d8a54c9ce356e14629c363547ea11ef3888faef7fcda1cda68538621afb79

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      34c45db51d178abcf58641ac9f948244

      SHA1

      e262b1be9243f50f5cb9296377422c3f29d081bd

      SHA256

      64482fdacc7f181435ec5e7e7dea1cc149d45a1457e096f5bc6e17d623ee54c8

      SHA512

      2bd06b1b9b438cb952aacbd973b726c58746471e9d06bcffe7fe1e30cba767c6dd59a8afdb6d552cf6eb84220d5a11b68d841e4cf27665f36bb420868e4c0673

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      70c70dc982f00ad7228816e68763815c

      SHA1

      f0d955028918ac935b17f69a1fdbddb7b2175fcb

      SHA256

      8b48dbc20028ac05cfa4dbeb87a8ea35a68f76cdd3456810ef77320760f5ea4f

      SHA512

      9131c8411c7f52ebec22e5e54aec85e62d9e6416b56a292ad96b23a7806db58a42c7f47d8811556e901cbb59c1b447e89096e5b67444d488187932157be37c59

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1c0beaff19564eb5d69baba7185c8457

      SHA1

      812b3e436f93586dda93664d541f4c9d237c026c

      SHA256

      404a6f77a5222684baff12e6343369d90f4159418b59f1174dc266e8540bff41

      SHA512

      71134bb46bac7e9955afc4ec3caf43714b2e38ff7a30f9deb4743e9b787f021a168d5e1603d037b66d22f9657d3341b05fe5ae531e8dace6ece744da0bbbf6b1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c059ce0490213d2a55ca944fd0dc6091

      SHA1

      87a2b8c175dee1d88b0991daba1d1430f6b3f066

      SHA256

      b029879dab4771b79d4c94ef9d3958cd70544db0c76b09aec05aaadd997e68ed

      SHA512

      136714b2397ce2ccd648560025f4220598a359e8bed96196b64bfb95659cb592994dbc8ef43c24c5c21aaddfbd1fc455b70f998d985a859feb737c417710dfcc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0ce9177f66325570f4b9cbdc8fbf72ff

      SHA1

      a9f9ee16833e6c37851f9e077ab3f014e8537823

      SHA256

      b031c0d8629fe531373ccfad751af3ea35adfdcba7013d02bd4321d8cdd22655

      SHA512

      366e61920342fe49c96cda1925c6b825c1a604836bf460c59040258edf780178267d5c74ab0ffa90ef215747549274ed6b53d26cab35b5ef2f6cf643fab2eb06

    • C:\Users\Admin\AppData\Local\Temp\CabA89F.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarA94F.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1160-436-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB

    • memory/1160-437-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1160-443-0x0000000000240000-0x000000000026E000-memory.dmp

      Filesize

      184KB

    • memory/1160-434-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1672-449-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1672-445-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1672-447-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1672-448-0x00000000003D0000-0x00000000003D1000-memory.dmp

      Filesize

      4KB