Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    131s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    09/12/2024, 18:21

General

  • Target

    daeb66acfb29ff74129786c2d3ea3296_JaffaCakes118.html

  • Size

    155KB

  • MD5

    daeb66acfb29ff74129786c2d3ea3296

  • SHA1

    0578777936338412de78302fe277bb64d0ad3a47

  • SHA256

    72c87b198963c359fef68adbf5a49a119deb4415d1098ac3ae00385d486a0044

  • SHA512

    a6ffba6801b84912f636a6e55ae6ea94105429ff273e6bc70e5983da15b08cf5dd65ab68fb11471e84ce60514bc923f121649b02df2c30d4be0df9c845e1c522

  • SSDEEP

    1536:i/RTrTQX74XPl5yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrk:iRrI+5yfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\daeb66acfb29ff74129786c2d3ea3296_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2320
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2320 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2572
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2724
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2292
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2204
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2320 CREDAT:472074 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2500

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8abb1e16bbc8d1b7daad44edc3f8ff82

      SHA1

      bf6cf9da00c46a544a7e9828d3ad6bfe9f22f776

      SHA256

      dfe8e8ebc4e0a4858e16a9fc7ba87764aac171dfd0891c34d77e86405d5b87b4

      SHA512

      5547b43d58043b95a9ab66abc1eb5061fcf183d7f70bdbd4be856d291c608730497576c3d470b49afe346d6206d7509b4dcf34827ea050eb31f4178eaf54ec55

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      16e0b33cc668085c80b349781f2c4b64

      SHA1

      86372d3c33c23f65bb0f75f444446cfa8ef1d0cd

      SHA256

      96afb184550cca1e0cd3e05745ef8453b218b1d7e2f7a10c9d78143cba138528

      SHA512

      2d9450f856500f6d7ddd6ea666e0f85e7a3c38b447ce4d773f64c80e64d84645bde32b2719f705de831c8964ab21f1324113fd88153cc5f668630e5f50eb82c1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a9f35dfc2e3bc79bc094dd2200b8468e

      SHA1

      5f7ddebfa739f6bd4dbb17798c54f09e5b34f5a7

      SHA256

      5998f7eb0a9652ac3bfabec5c7a45cd09946cc3f727921d770e7e4e3f98e804c

      SHA512

      45d22a33a3b17313c9f33e9f0b72aaf153e01840e3516e907817a8c7598dd65d39b2ed4a5c183582d695ea92792a7ab1c729e67f4aa5330c2ae9f59ada93ff23

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1499660f47667b4f9ba8bbc9445d01aa

      SHA1

      5747473b8aa8cff5800921d8590330abaaa54c26

      SHA256

      d97d517f4821d1052c3bc027bbdc41e4a9df202713bf96d35150e8be2baace39

      SHA512

      d76985a9b9d17351453a346613b675ab5655dec9d8f3e4aa16e0a42d8a4a3046e58be98595206e9831d0e6bfae43d30e7e808dedb47fc1ab298ee03fe139d216

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f64b1a5d6e2595853845a600c6d3147c

      SHA1

      08ea10e7b6aa6581b4e58b585009a118dd785103

      SHA256

      1ce7a06952fc7155460d3aa68fa5c6e861c26755bfd586d0eba91b8188fe9b54

      SHA512

      500607c67fc6307b88c8a45cbf23247499410a25f4f47f0a18d397a580df8ec5bde0e363cb1827a36b39f1502432409799b3ff71b68504d394ff5848152b15d9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b40b5365b5c42fb12067a0e0ba51f110

      SHA1

      972196d2ab7a74876dae9316c04882281b861d72

      SHA256

      1a8fd671f4ab79a2b69d8a20634dd8d7a8face8e7aeeb62c1f2a2143e1a9c400

      SHA512

      da614ca68b1a358f3d5de3cd4251527f65b00024bf0acad0d096a3712d0b87e915dc1e492aef4480b6424c946e37fc4b320a996fd77738790caf5825a7baefc6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      85e3c00c298fb6eb77f4f3394c2167d8

      SHA1

      9e1c409ac594bcb938b5dc2a276944d83b8ff9c7

      SHA256

      4164809d18fbaa42c203e5c9ea0432d7db1a361cdf3e05bfdfc9c27cfd0264d9

      SHA512

      1d518f9df6669403c1cf01d9db2d2ee7925ca2781487e8ef50479aa1c83137d24942bb2f22e058ddd426817a6c105fa6a7d01cc40d54c639a68df2c254f96611

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      352267c7c930c292685c1b8fe17490ba

      SHA1

      a8842ab33c20f8d0fd0d3f339165698efcfc9cb8

      SHA256

      268cf3f968e5765b9a92c04d6ed10fd2acd8c2e543afc99a0197a0c17c283e4e

      SHA512

      0ef54c63615f254e354ad66c231580c7a06bf0bbdcaad73ff1e06d0f52788ca24a5713c23fda89036efa3be2d1ea256bf4b4bb7152ffd311c9771c23580b14b2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2ec0ddc223ac0620d5033d76a75e6b17

      SHA1

      5220625273ad3ceac7b011025937cb1d919691e5

      SHA256

      199225b540008410e5bb98a40e631a402e065e91f7207262ce0a9c9bdaf54b5c

      SHA512

      77e0ecb2a866bd7cfdf066f4e88f42d7b5f67d67b8a55e6386fe247f3d4d1c37761c4f4d6fb822b69aa0e545f298001ae8f659456b130982984a6b8b8e165e74

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1fe8c4e44f2934e28cfdda2d02a2190c

      SHA1

      aba8943c0e7588e4bc0e224439e2c37002d0191f

      SHA256

      7a588b89639906705ad8a333968d25b4c61c7b3a4e64d9eb25636286b0ff23a9

      SHA512

      4c638535686a7b6b301c5763c853a3679b3bcb9468a1a874e961a46707b9087e33da29f155ad16c6320560236936753947eeab2d0e6482d96c56b73599af8877

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      36a78c6440fa1dff06234c2bcc687617

      SHA1

      dd0032e51f7d570df22403339941e48f1915a277

      SHA256

      e59b1ad47bf2cb57953c97c715c91716da196be90a9a068e6822f3b2102437fe

      SHA512

      3124b22f469bc462cb478a88357f5537446e772e212f8c076d3c4e189bbd4c344cd5fabd89d539eed15d07aa5b6a112d0f54aeb4895adb3c84ff8aaa81fe29c1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c22603ed009388ef3d8a7319af8fbf91

      SHA1

      3a6a1dee8d96b4a9ae1a853e06fd73e32489924d

      SHA256

      c1492d4708f9af8c009b4e34e536f1d391b3f4d528e7791c88e1de69705bb142

      SHA512

      f331e09aa2cc9b9b94652d8069b457d2eff17097963710836a2de72b2be506669deb8d8a851ddd62ff4dd06ca7c799032580c11393754b7bab6c640a365112ae

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3bfaeb05f89eb327db1a34522b496981

      SHA1

      e577a794c952b227c05557ab4ae5140d69d20e4f

      SHA256

      edf6efedc92beb06cc7e5a9155f023a1acfa8633d7398c1030cc0721a92d5c80

      SHA512

      184573ab649735d4951da16c73cb2a4bd52522a583dfdeddcddc3c98e0680209d6db20f67dcfe3c6560232efec4875b1b090e4fc5377924588a4e8e1cb604bc6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3f575a56429f2978ce29957f0ceed48a

      SHA1

      9f1797243d0a42661502b6db7011fc381a0a28cb

      SHA256

      8ed9d72fba7d08a0c00f3708bd83e041fa22de6712b1fef2bfbebd3be3d54433

      SHA512

      b9bfcb2fcbdfe5ff48884b55035f862ca41fd1d2bbb5ef7f59cfb3925506276f9f2e2b11cee9536272099c8d5425adc6f422386ea7e8b7770614bc3f34beb9f2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      06fe94e38fcee21e84f9aee2bc8605c5

      SHA1

      7cd19bced5c13b8fb7ed40becc3b5b64f699a809

      SHA256

      2d7a91faf75f6a5b85c4b04750a27ad26e5c905d280ad4af8a53bf227d59e939

      SHA512

      ad378aace51e69675b371f5f0f4d23f4a8bd93e2619899e58b1a50b6de9dba7f65e16a57ab04a64f011af118e605ce3d9869a5d94090f80ba24bced16b099be8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2ee1451002588471a9cf53524fe3bc6a

      SHA1

      63435c2f1c81be0a43edc26f6936ec21cf226e1a

      SHA256

      a2dd11203db34da025c03005da4b60c3b99c552ee62f9fd64e0cbe68ee2625e1

      SHA512

      4c52f1efa8a55660ff482603a510551a54e3942e1078ddcbdd3ef31e99d9f50e75f29a8f2b75d74bb223a7c15c980b5503473acc40afa1c1a6dc8d8e18ffc407

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      26761cdee0c42b393324dacc965165e4

      SHA1

      c98ac7fb37fb425548da9627c53012b19d9229c5

      SHA256

      01b674d45bbdab13f6b515f99fb6fd5582cc9db80d2a1c5388f6701fe90dd0bd

      SHA512

      1fd6c476514679c235403e0455883b5dd5e81e0b951eb9fd1f853cd5a14c7e455473e075828f1ec035432a656481e5e1ee6121dbeb811486cd5b8068f703d413

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b1a75c3a739827ca86ae9270db710222

      SHA1

      a66ba915217c2cad2ce916707a610bc1d3fd6329

      SHA256

      fa832306b4adb071d3a799bf555381f8e827aff5216bb431212d7cb97057daa8

      SHA512

      737c663a7995f09da9c2601bf4ac14ea4a131389088819ee51ed55fc8efc737b0f8b880c536f5357210fb981457a36a917bdc3dd8eadd14772ca7f75c9bb8dc3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      75a2b06228dc7487803801a7a33d0dc0

      SHA1

      e0672105229505e8df4351b2008b68504ef75672

      SHA256

      910a96dcedbaa759fcc0bcce04416943d377d534616acbe564bdaa6adc1c0a25

      SHA512

      be2b87028e62c02d3439090ab5d52c03e7d90c293a924b72700bc13b39515ffc594ebcc014e19a44174f469805d99b08db9db87aece857892c1b12d3ceb1539d

    • C:\Users\Admin\AppData\Local\Temp\CabC0EF.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarC19F.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/2292-446-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2292-450-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2292-447-0x00000000001D0000-0x00000000001D1000-memory.dmp

      Filesize

      4KB

    • memory/2292-448-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2292-444-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2724-434-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2724-436-0x00000000001C0000-0x00000000001CF000-memory.dmp

      Filesize

      60KB

    • memory/2724-437-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB