Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10/12/2024, 09:23

General

  • Target

    6f3d6bce14407fbc12d6a7372a988c06bd84e1d44dea8ed6b4c4bf77947c7055.exe

  • Size

    1.4MB

  • MD5

    6706a3d1fb79cc02ef9817c0f77331cd

  • SHA1

    36cab5ee9e17753b9e8f301032ffeb5b971e3a59

  • SHA256

    6f3d6bce14407fbc12d6a7372a988c06bd84e1d44dea8ed6b4c4bf77947c7055

  • SHA512

    a20400372de0e8683a7dcc17dfd1a27d0c54c822bc3debe2a4b1f8db1c1114c20a0554966e62611c1f4b8f62a0a099a4a08f0ec3267d426fffce68d863657e35

  • SSDEEP

    24576:EpU3n5+rG/LzOaLahrD8hcrHhjN/NnMTkKPZ6WSocKEsO:8UXMuXOhrgh+HnoZ6WJct9

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f3d6bce14407fbc12d6a7372a988c06bd84e1d44dea8ed6b4c4bf77947c7055.exe
    "C:\Users\Admin\AppData\Local\Temp\6f3d6bce14407fbc12d6a7372a988c06bd84e1d44dea8ed6b4c4bf77947c7055.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Users\Admin\AppData\Local\Temp\6f3d6bce14407fbc12d6a7372a988c06bd84e1d44dea8ed6b4c4bf77947c7055Srv.exe
      C:\Users\Admin\AppData\Local\Temp\6f3d6bce14407fbc12d6a7372a988c06bd84e1d44dea8ed6b4c4bf77947c7055Srv.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1040
      • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
        "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1568
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1884
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1884 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f8ff0f297546102b7de31f70c8cfa3e6

    SHA1

    22238b015f3c4ae0277058f19d531fbef382148a

    SHA256

    686cea3844ea67a82e1a52b0d172ebfafe0ab8dda3a1343e92a48bd89f37d156

    SHA512

    ce7ee2dbb44c7f2318c5165bbd08e40b8421dea8e05956d6af639d44cda371a890656e4872c5a3ab170779250fd4edd93dce3c4e86ec234156f8fddd20d1341c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bdcb565b7dfb01669fc698bd87c22991

    SHA1

    18efef2f0bf59502590d044db5697fc0be8e38b6

    SHA256

    ff6b648a881b9976e2084c62aac489bb8c5ff59ceaa2821b6fc169d0eee5cb02

    SHA512

    9cbe4784eedc12f4409b112a0f1eac2c133c1665340e5850018139ecc78b711113deb5099d078e2cc69b5a863c6056592eeb7fa9d7ade49e7aad23be5dfa8cd9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ca3ee61631e1bff06862001adad7b2e9

    SHA1

    2de35e26d72bdd865752d29e15b996a8b310e600

    SHA256

    cad6af4a03587dba9f52a0266f8e8a148aa0013cdaa6f6b366edd905f1a2ce23

    SHA512

    6930593c6efbee2d63d9b6942ef9641072776899e018c1851f2cbf27a4806ebeb442c38e7a31366a8ba3ff0f0f269b47b84bb1da7549e59fac88e6f0468d3be4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f013d78cc9443cec54cbc078a38bb8ae

    SHA1

    8b54ef12c5fb20e479d2c9bcdee772e9174de10c

    SHA256

    465bee4b89fd3eb97c4f7923a47ae4dda6607540b129b395ee43e669bbf575d4

    SHA512

    36d04e29a8045229f8a869aeb742dd74acd37834c4091d232a1322ea324d39d99f18983d28e8ae6c3927eb573c72d918af210a54f351d2566fa389bb86314017

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    084e92d6e24fb77090a6b87705e036a2

    SHA1

    d7a20a919412d2d28aa1c5da3fe1ee81aceb2a88

    SHA256

    a24cb30a8f20d8e2d7881135d740cf56a8d0fe0ff0ebfc0a720c87be78602f2f

    SHA512

    16dfd9444d54a484c19bbbfba03d7a4440a5375d506965565631620088b4d7e5c0c2b788b343ffd633bf6b5eda26a2ad144776f721d0593a14e98d69834c6bfc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    feaef5c3ee7cafdc52e791bb5927dcd2

    SHA1

    74ebe97ab8eeb4996292368d0ed238dcc853dd7b

    SHA256

    1043a033f46a46174cb4e8e9b022be29fc170ae562823f2a1684264082430ca3

    SHA512

    f770028f1189db3f4556058cf1214e781d269d8fffc9e071ffec3a9e15ce40e58c73bf57e6189715a92a92c7b28e71667e3298003b5329658244fa6694c772f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    69eeac94cacb3f3d4199b3cac9190905

    SHA1

    6f5a105b6dc5c670b042f6b6640b39677325a887

    SHA256

    9e2ad6f29228849370341a1a84e387e954dddaa2b515336fd01ca3b47cfecb8c

    SHA512

    bc8126e531e2abeda978192befd845ae791b306872a8ca0d7e35a3cf05e793bdcde9a5b3824a2f359b1cc0b2dae2b1e6dbf4ee8a02bdb659b4d03d9c3cf04703

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d28ed6639e92acb4e410fe872be9cf55

    SHA1

    3439fa0c9f62bcd0c8e869c24cd361a124e68ed5

    SHA256

    dd814a0ba2128a28cb51e6f4fb6b19df492640f43fe922e90195f80a902f3a9b

    SHA512

    5eb1fa6d9cbe0f9f4417baf517afc472dfc5e53e541fe3be367c43ffbb7e1bf543395d7ad1d33bb4a569fe4b927efb4e57e751e287cadf851fc7894519ae1079

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d9db7c9f3a203d11001953acc889b92d

    SHA1

    27fa6b1b98ac29dd6998f421c9fc47b44094a137

    SHA256

    ee356ac0a412c73fab4766b1029528de1f22c3e8a1fa416c9d10e0d43303afff

    SHA512

    433fe24ac8a04335c1fdfeb4c31972e6d9b0634952e112ed91eace3f52c04615b32c004b5a9beb6db31c5af17be729c65a4a913fa861a8291506b8f1c1a165f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8a11b10e18d651895419147b129e409b

    SHA1

    03b7b1f2a7c4aa9a686b18ac3de79e7cce6e8798

    SHA256

    94c4bc5554336522aaefb5fd1d77d3ac16259c573efb533310256532ff37fb26

    SHA512

    267a2bd2ec6c3f3437df8a42831eb011d4150aaf04fd6e7218357f5ae1439038754dec4e3c850af5f90e585aaf244c526ab7f9fb35bcf60760df653114e54ed3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4d39cf9c60bbec1eab58b04e13bcf09d

    SHA1

    9c0ea5a8858cd4ba4b5061b37717c2a2f16a2fb5

    SHA256

    e340a706f1464809ce52e79c602cbc212295f294635a2fab7e77a777c847aed9

    SHA512

    e109b7b35b64ee67c756c6ae0049944aa8bd19837654deef1fca38c8a1a93cab1640c665b8422f417f2ba63960cc437ce219fa745e35ef0d01f1072852d9c23c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9a40aa60a47c43cdf20348f46eedbf41

    SHA1

    db6f1df92675ad10a1cf8436ae2e2f48c590f3b9

    SHA256

    dc428ff4234c3a35de5229cdf3231520594f744ba88385ecf21dc4c4f013744c

    SHA512

    643be8df218e35a4e776c67ffe4de945e829b925a968bbfe4eaf78d76c219c45f3dc998f44b2d18c9d29996af90f1b16a9c144748f17afa3345d7e20308b11ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    78afdbc27d30b79887140bb36a24ae84

    SHA1

    d44288d073b8870fb0505f78d15eb525e738d7d1

    SHA256

    5f3b18d45dd47ab35563ae7e1f54828c865a556f84c597bc0340edb359f12fb5

    SHA512

    9bd394ab1412a70f35244f39287db17d35bd9956c9719508747a6c1c62ca3a8cb244ba25be4e3742eca23728c5d779535570d22b0e37f86cf313c00f10d313ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    54c60779c1ad491e9d5cb31c7a77f9d8

    SHA1

    70b61aef4dc23605eae51287ddc4aa997f450354

    SHA256

    131722a4ba8d8d16804fd9f42fc66e646bf5ccd05cabeb49ef7d19fc11207c5e

    SHA512

    7c111b8b4c0237902e4294eada976438f7d38532abdf2f822d8069bbf532275b456b1162c6bdb58107d8c89cb570683570cdd571dabc7a10a8cbe9ab614e719c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    92774d5398ffd297710eb6a7c5d52209

    SHA1

    c397db9e1250e5660bb8944abd98bad73406b87c

    SHA256

    08bf9f63a5ddee297897318775fa922f1d084d22d9ca192be2dc9a5b54860d37

    SHA512

    007ed4ba3e5a19293a1d8ec8c5b1b2cadcdf40e94de52d0092a6e99f277ab530643b57a3b04ed902028ec59a96c71ac16407ff59af2608111971614a6fcda817

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    84dc8d8bdd4b5cb01bb92627ace7c2cf

    SHA1

    705cb604dcf132b63b8c78694b3e858c0141df9f

    SHA256

    59ec342ee2137af4f4ceb015e7150f7a1b9e91614bbafe84422d609c04288188

    SHA512

    00714e988787aa2ad38b2e6c8c1d77f07e44e310b0fc23d1efed3a3c78fee3720adbc4c9fa0cc8b725b7d607267b2f9e8a4820c3151d06e37f5513c7278cdd23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5462532ca6fd1e8a1d7dddfe71b8e542

    SHA1

    8eb10aea1a94ef7ff993b283b9f1e9e2df0164bf

    SHA256

    08f906e67f68cceaa07f144dc5a589ed70b21a921b1ca1efa7de5a8d4386df6f

    SHA512

    86cdc95f425f44c7d61460cb31d02164b010b67b4cf0cee9e6f5dae7ea450a1fd86826b8b72a6f34972213a627561f87171fece98088154f67cc767100d7c78f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aafee52b9e1b3fddfbe2914fc08b1691

    SHA1

    0cf1b9d0d8f211d4584b1ca1c84c8a51e50c522d

    SHA256

    572875bd3cdab79a6c4a6115772ca93c1e3f6cd50eddf4d09b293bcb73a53817

    SHA512

    875e7edd98d4a91a48f65b4ececb4457d17f1720e3fdc155043d7cb5e0da806429d773acccf4a58eb05bd61deffc701a49f9bb7fa6b020f9d78a75f71118eb2f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cf0016f0a23ec24aabca4df37ce91bf4

    SHA1

    ef1d7bf3ce7b15085d2a5647975b464b8a436cee

    SHA256

    261ddfef7fd3aeb07cbc0565fd05850667e8fb10b090c330504492d6d1d47431

    SHA512

    6a3fa8794e96162187a92051c81aeef0a662237ef5bdb7f67d6dcd691b90916f8b779b60b0986e597f522d1c021a1c289414bf3df019e7885111701cefae29b3

  • C:\Users\Admin\AppData\Local\Temp\CabE708.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE778.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\6f3d6bce14407fbc12d6a7372a988c06bd84e1d44dea8ed6b4c4bf77947c7055Srv.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/1040-8-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1040-9-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1040-13-0x00000000001D0000-0x00000000001FE000-memory.dmp

    Filesize

    184KB

  • memory/1568-19-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1568-18-0x00000000002C0000-0x00000000002C1000-memory.dmp

    Filesize

    4KB

  • memory/1568-21-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2080-5-0x0000000000150000-0x000000000017E000-memory.dmp

    Filesize

    184KB

  • memory/2080-452-0x0000000000400000-0x000000000056D000-memory.dmp

    Filesize

    1.4MB

  • memory/2080-451-0x0000000000150000-0x0000000000152000-memory.dmp

    Filesize

    8KB

  • memory/2080-4-0x0000000000400000-0x000000000056D000-memory.dmp

    Filesize

    1.4MB

  • memory/2080-22-0x0000000000150000-0x000000000017E000-memory.dmp

    Filesize

    184KB