Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    0s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10/12/2024, 10:25

General

  • Target

    1420fd484ec6a64977a796034fb7e575a1970533135d6cc058c98719e4530999N.dll

  • Size

    400KB

  • MD5

    9af9640d3f6cb20a41f1a54b75cc5750

  • SHA1

    5cb3ca3cac330086463379aa74b77bcea1d31a65

  • SHA256

    1420fd484ec6a64977a796034fb7e575a1970533135d6cc058c98719e4530999

  • SHA512

    a5b6e45b61d76e12ba8a926e532c870c94dde204e22ab5d06a2062498dd54be25cb0ca8cd118e142d8132ef07c28ca92b9ed4361684d184b462f8fdd31d8cdb9

  • SSDEEP

    6144:ScV9z83OtqxnEYmt3NEnvfF+Tbmbw6An8FMciFMNrb3YgxxpbCAOxO2ElvlE/99y:Soz83OtIEzW+/m/AyF7bCrO/E/n67

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 24 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\1420fd484ec6a64977a796034fb7e575a1970533135d6cc058c98719e4530999N.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2124
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\1420fd484ec6a64977a796034fb7e575a1970533135d6cc058c98719e4530999N.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1016
      • C:\Windows\SysWOW64\rundll32Srv.exe
        C:\Windows\SysWOW64\rundll32Srv.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1624
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1224
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2256
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2256 CREDAT:275457 /prefetch:2
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2928
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 224
        3⤵
        • Program crash
        PID:2032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1121a943bf1f3494f64cd03101bd197b

    SHA1

    94085cb5040228c051edec8d96d7fb4d521ef875

    SHA256

    a2472e8bc7274f72511836bf33239917c07e47b6d80cae640e6306558ebad413

    SHA512

    4257bac35c96114557f9f860ded2b87f95002a737f3e0febe5fdeb4ab9f03de6370209e8c45721ba37dc240d8db2c5abd014de4913109f896ea3aea119e4c95a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1f8c3a216ba5865be9f1edc029541d8a

    SHA1

    50a74af5810eefeaebc7f7216066a02ae1cbc16c

    SHA256

    573faaa8e2f36f072a0b9e0a59fcad7bfdfda10d2b85a42d233b3a6b9cfb203e

    SHA512

    b8828222b718f5798f9ee2fbd413bc8a0f9568c480ccbf0d9b59698071066c41d2a68439edb3094521714417a4b554fc882cc9341ee446f214d5c92855094f61

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2d3dd469281cfa89595097cc66f3788e

    SHA1

    caadd9527d9f5cb8530a3fb276ff148c7b14147b

    SHA256

    17761ea2ab7c87d1f1373763c0a20a60bdac45d300fe8111ec292b58602689cf

    SHA512

    4d58ea741337945adcded9a27b193068fa761f3e1fd600a84365b05073823b3aab96a04c4ada9232ff1cfdb673251bffb1b3ab92991fb0942b84aa68fc1f20eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5ec72d43252e96fb619074e39ebda928

    SHA1

    f1630428443f7fda159f86c83bd4c404ec44b16e

    SHA256

    2273668718fbabd434619336b74dbf44f757cb9b7c1ef362d5e978762c8a6fd1

    SHA512

    760c3b3791b8f8dd9e9d38f23e83a6fc987d84f27e1ea16c5afa406c3abcf590d854e173d8908dfcde0c926505c7cd4e17791cc64ae42713d3313b89ecb83b3e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e01e7c843ac7e59256e620e784e667d3

    SHA1

    bc1aa455e3cd8321e7907713ebacfc68bd0bbfc3

    SHA256

    77c8cef600dc1621af6749f60e06092f7be17427a9addf4148cd212055a21804

    SHA512

    de373c59540a8b8a21aa2db76c3233a063498a1e5d973acc000c0d9b287508c12d1486b1159dca9fabe3bd0bbafee808d10ad74721937d364a5f7feefe22eb53

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    35fdf8219c6f9af962744a44cc9e8e17

    SHA1

    5bd0841b7bf39e3d07c6414b19b96e81f6d81212

    SHA256

    3cdb30964e70fd75f6e8b9e95b235c8c2410e0bcebad029cfd355b1593695879

    SHA512

    bdb34aaacce968d5739593312d020c9bef5e15a6c3f70407fa9df98aa26e8b564c4ee91084035d59eec0b3326b630871af7aa9e38b20017bb0aff17b7a1d6d41

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5489eb239904583bb74e56fb7c62b2fa

    SHA1

    39fa7d3770fb21bd43b1ab04329448441d5256b6

    SHA256

    fb0e0fcc1f0b38de6367b6350b9b0da9237f5add5b5cc0054fad363006964b14

    SHA512

    7561356a8e74213792c0bc7d3a4ae923c428841ae244eef2c8acdf93d0b64b9471bc29dece51fac920488cb2f9fecb889b7f0c9b1bba536f66186c294b2ffd60

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e6a4053c8bd9df38bc73e7df1c124788

    SHA1

    d3aef8b21e62ca317b90dd0ba92e57fcd25b5d50

    SHA256

    787b014b4f10372616b0061e350ce9e69880f993d416df672dd8f47439b6617b

    SHA512

    1c14b2550ad5fd29568bfe5bc6ce1f3f0f5db4a2168d871cd6e1ea9b5b5b6b09efe9df0b9995c22ec7b6cc384455e1c206186ee1625c4722720ee0b6a804bb34

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    374f1ecf199454d131f3e2eae3288c8e

    SHA1

    01a67de44868ed2f81166d780189dcd039f7b634

    SHA256

    7a6c7067899dcf58ae66607376b9a11b0f045793c5734a442d19e2bcc3829c4d

    SHA512

    20b9c3f8ca59265fe446db973de6b0fa18ea78359c8e2aa463024e2fbafb38a2596baa68c51409de3641f3aade395b2444b4ef7e4be9e391caea80d4e365386c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    73f74c9ae9fe058cd39fa9c74e677fb5

    SHA1

    a0dc430473816085d175b87849215e52adccd681

    SHA256

    000120635a163a09e90b46e2351d0473d75925767d1727191ddbb66cd286a800

    SHA512

    48bb96d769b92e6d50e8dc3b2ebc539b68a17c2cd93282104186169e2a5462090ff5bd404a020ebde8663ad89468a139da769a5458e9d6ed13d3d81507442957

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    69ec28e3257a8832bf05f7faf6403b66

    SHA1

    c8d5a37bd4b35b511bf1f30a11f6201353a24107

    SHA256

    b109a23220356ac42ed574b94dca46414aa551762468329e17615703a89f6307

    SHA512

    76b017bdd6f1d8091ebd52d98db473d12beff81baf5bf4a43978ee59ae3f4593d5e66909ddb46ecfa04cb814e08a294504f52bdabccc7a636ee166f7646b54ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    301a7a764c9189f51e162246e5a6af77

    SHA1

    768cf5a4eacbf3eaa2e5add3a1ea182704b3120f

    SHA256

    81a6a89f27e718609cb4fc3268a64b4fed34805d12a269850bebb210d73a0fbb

    SHA512

    936259b24703ed97bf3a829f0b644d89143ea3a9087471cc5a19675768e1e9efad4441378addf3acf2848831fb162eae847696cc264e0f348e9937a3bdd29a04

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    532a66b140944a2ea2558b683f4f94c4

    SHA1

    75ebbb7f99b63cbb3667b4bf9a0c8550c2a9b02d

    SHA256

    885cf9a95fbaac74aa95b21893b9ada7f80761e6d7e414feb532239638f34bb7

    SHA512

    0577188567e4e4ce9f595031e07365fab4071ff56012a59b6ca7bbab23418ee7b58ca7a990d4a300dfe6837e826f84689d88186a31c925dce8af1cc3694b957d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5105e402d0764c4162e0e69e63678976

    SHA1

    85b305af303f25c24f27871853f9218149a2774e

    SHA256

    0873daa29825de8b32fd9260991b8a0f09ac9a7acc8369c456fedae0157e94ad

    SHA512

    c41fc515606c8529b2230ac8550e041b3ac30d8d42259c45e77010cc107af6a3c7b012edbf4dda55da4d7fcb46fcf2f6c492a081e51aa671837a68cdc545f119

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fa971fee72b12816d5d494517d658fc8

    SHA1

    e07e4fa77eb782546e30eed84bd57e34cbfb6893

    SHA256

    9ec084c6df60e1516198874a8850272398ad68a8e8e66cb06dffaff8e3b00232

    SHA512

    6695f3c4b40d724954e67359b2ebff16dad6639026a1b5fd61f074fe518185d1d3cc30813630e00a0e58324f70e8b50e8c36fd280032cadcaa19b18705d73619

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    67e6cf230a2d7c861d023349a80425ae

    SHA1

    c5bd0ba6ebf6f1fad4615607b1e2b74c680543a2

    SHA256

    f53f761cb5aa9de527d19bffd26a41a5de138df425a870c0a32ffbd5b0af3135

    SHA512

    269d32872606507edbb3938601140e87c9c41bd1f1d5b6f5af287787d2a6a26849c03b1efbdd10b35c21e818cd6ebf35e8ddb6e9a90c7448310fff1046506056

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    53a539f0bd53940c7bab68c135f542a1

    SHA1

    9b0c51082871c13ae533ea2bd4cc813e5e6c653e

    SHA256

    68af93fb276c49ef562c996c63ff2954696c27656c4fff64bb6ac62858e5fe47

    SHA512

    23d065cebbfb9517d70eeb7215df03339e2377c80922b1f865127531ce968016cf5032e17a3c4f01becafe1765351b22e6917bb89b2d0b1b7f81b4b72bb5812c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    122e3f1d32c2ab852a2fc1eddb00b02c

    SHA1

    9e6b21ec5ca7fa942282529d702855684575f39e

    SHA256

    acf985e190cc1429e77664ab1e7cb25357dce912d879cda53693dddb0a5c0dbb

    SHA512

    149afd0b5b712143521322e4f2dbfbba36915c3a03329af3db886da104a75fd5d0c12aad7030c3ef01136570aeb2a1f2d0d47386e4f38331103e2f6fa5045a2c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8bdfc46754504fd0216a876415cb88a7

    SHA1

    c4a8f7808415521f9e3db6f6ce69f0e430310de2

    SHA256

    5a831624ac1fe8bb5ff0f3fd7a01b17470e6d900334ae24305418d49f39402df

    SHA512

    36dc08563eb6973ec49a294cb16d1ada00e18e3f310778a883522f30efffe6418555cea78c99215ea1c46fb71d09c0124532c2beda99047e96924c7d657a250c

  • C:\Users\Admin\AppData\Local\Temp\CabA5F1.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarA653.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\SysWOW64\rundll32Srv.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/1016-6-0x000000007C340000-0x000000007C3A5000-memory.dmp

    Filesize

    404KB

  • memory/1016-1-0x000000007C340000-0x000000007C3A5000-memory.dmp

    Filesize

    404KB

  • memory/1224-21-0x00000000772AF000-0x00000000772B0000-memory.dmp

    Filesize

    4KB

  • memory/1224-20-0x00000000001C0000-0x00000000001CF000-memory.dmp

    Filesize

    60KB

  • memory/1224-19-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1224-17-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/1224-15-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1624-13-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB