Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    68s
  • max time network
    69s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    10/12/2024, 20:18

General

  • Target

    581f982bc1c588ee8bde45af757ae9c0bf1e419ea07e5ccf63f06923054573a7N.exe

  • Size

    1.3MB

  • MD5

    f5dd132e1f2e3b7e8aede13e367eb0e0

  • SHA1

    5f667763313270f383b6f27d1039150a4979844e

  • SHA256

    581f982bc1c588ee8bde45af757ae9c0bf1e419ea07e5ccf63f06923054573a7

  • SHA512

    24d7fc0bcad3af3820d31e402260ea4c165263f71024191e5eeb06e434b2ba51bffbcaf5f829bcc0046b021439961bbb49683a0560ba15908ddba0b61c2a4a18

  • SSDEEP

    24576:N+TyV8jQFntoEiA0lYA0dILdBUgASQaob7vK/D6zyMxdv4Es:N+TNsTJiiA0dILdBUgzub3yMLvv

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\581f982bc1c588ee8bde45af757ae9c0bf1e419ea07e5ccf63f06923054573a7N.exe
    "C:\Users\Admin\AppData\Local\Temp\581f982bc1c588ee8bde45af757ae9c0bf1e419ea07e5ccf63f06923054573a7N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1312
    • C:\Users\Admin\AppData\Local\Temp\581f982bc1c588ee8bde45af757ae9c0bf1e419ea07e5ccf63f06923054573a7NSrv.exe
      C:\Users\Admin\AppData\Local\Temp\581f982bc1c588ee8bde45af757ae9c0bf1e419ea07e5ccf63f06923054573a7NSrv.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1720
      • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
        "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2176
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2560
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2560 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7666135d16bb5771674faf8bd9b8330f

    SHA1

    4d626c7334960d864dcf41ca4cb972ce4f985af2

    SHA256

    fc7ec2b0c19a4bf2913228c7fbabae849901cc401c8de093a66b2747002f361a

    SHA512

    5bc46eb2b5b1153ae130695be893e2d2c6f8e2dfed2452fc8ff92abd9f2eec122990a04ad38f858f1450b89c7ece4f4f5e218b1409bde0ddc77b532ba12393a2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f1161e6a9e6d6912c64fdc59a69db5c7

    SHA1

    4e2a4f2b9a383add6144ff6a8bb4ceefd9e2069d

    SHA256

    526183379ba809ad90f056e84a03b12612f20601f5c0e5219c9b9275d7e6ceca

    SHA512

    07c9799da0876d3ee68101899e4dd342b19cc4740877b97636f640375dbac5e8fff2c736e3711a77ce8a50b5a6fac03620a21d3609894df5fc3312b9c23f18f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    20e0f12159c72ebb20f2adb7d3d64233

    SHA1

    fabcdaa90ef646d78333abe388a40816abb75f22

    SHA256

    9d2ee6962732e55c35eb09500b31887ae36b71ec7757b09dad3bc2454ffefc8b

    SHA512

    f18145982afb30d8c505646ce62a8c5ea68b7d48beb4f2ff877c79a6cb9270e3c1bffd1ae077a382f4bb0a1ccefc016e30caee644ce7ba22150a3faa3841927c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    754c1f507311c7891a58b573a325eda2

    SHA1

    dc5ae45073420dab012ef161e790d5bbacda6593

    SHA256

    06a8c190fa6b4c14447af5138ce593cbb9485ee811031441a3cd9d2cbab7119b

    SHA512

    7a417d67c53e98be9760b9982327f039225adadfcdb6c8273ffcad4e304241392754a9b7cf83f64e7dc56bb720070430704df2c0b922898ea001328306716feb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8d0325dcf63e60884604f5cf0c274912

    SHA1

    7ee1cb3f2f4d3753f5a00da378fb0478eb2e5e3d

    SHA256

    c67a17ba9cd53b8b29bfe33fa7ee601de351252a5898b7297425823bf2f479ee

    SHA512

    e861f6e39331312560c9dfc230d773f1510cd495eec06d2f4e3dafcaec00758c69a0dd640bb87e6575879c13cab8ccda683f7f3b28c6122d57d01b59b77d44a5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c14b13ab1aea0dd4c2332a5a03abef01

    SHA1

    e402d271cd4b2be0acc1343e58783bc0aef32b08

    SHA256

    5d6b750b83d4ef14e3df082260d28d4e84d04848eecfb43a89e1336d1181c87b

    SHA512

    67e9079acd8f1d9d6acbb192934c725896b92a628a4e06fda59f32b3187aaf6b02201214cb7f04299ca71d76818a2f3efe284223084b2a35abc604163cd8b97c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    89527520f855e60a770ce3f4d63b9370

    SHA1

    e9acaf263445ee699b3bf7b16ae144abec9122ee

    SHA256

    b1850a62f5133f150ee15789509bc505c8eaf385944d282adeefd13b4908eca8

    SHA512

    622c4a974a8b9f2e557e271e04236f1e04359039ecd3eb7db7b511c0571d7986f9c38ff275a9a2bdeef461f457086aa881feb5000d08854e1eaaf5aba9128eb5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0eeb6d8a3f44e893ac2c9789b1238f47

    SHA1

    9f6a133f24b5214ad73412857617221db629c1b9

    SHA256

    4a86f34e4d33b267b0fd41d6d97b5dbd52b65f332786469640c263623d4553ca

    SHA512

    42e3c8b2a228293d073f4e6dfbfb91025d6d42fe6f2318a9dc680d7fc74723a379f6bee134c208c9fa80023c800e487fe8c874101426496c002be791f1c3a365

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    195e81ba05aa63fa908c2bdaff19894e

    SHA1

    9200385392e74b1772694adaa0ba4633aae64b1f

    SHA256

    d4f90320a9fda069d48339eb1e529ff362d6de6d8c4b108dbfcdf9a4053c7a6c

    SHA512

    77f8add1292daeece25a0e23ff899a075b95a87986044892edf972e1096cf784212507d53b3cf0fe092ffb88897c29b3c89c55edddfbfa6ad5d3037414beb412

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a167977f8a14375133dd9333e173baaf

    SHA1

    4cd887d8e79aaca6fefacf80a8c00b9caa2c58b4

    SHA256

    c217c49ace751bf1e7a877dadad183d2e32a77191113b233b3db050b25c54554

    SHA512

    137e856ea594d2019ca7a80d8ae3e3eedbaee59e076c3f5331a284147e80e2547f6e0e36922bb0aa03ae8ce86757ebdebb934c8b49d136dd1744ec8c0020f229

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c0589da9c9236c0459475641aae3d979

    SHA1

    e8318a0fdeac0e7d520a33870c8813fad800c5ad

    SHA256

    895606436d758d2b630e48d6fdb6403e47b7a55e4e4a89290745b24042fd022b

    SHA512

    2f3498142a2a04a2fbc3d6b46973575ab67dab4294fcd4a17c2376a1320dc4b9257a8d4bb8cdbee6c850932ab707e5f61e7e0bbc52a502abe83d671d329274c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b4f0df2aca363b4207eb2318fa64b347

    SHA1

    fd6409f966813001054eaf0bfb07b997f245fbd2

    SHA256

    deed34e248fa7a18120aaa8a41be51fab0be9a1a9c47cc821fd8b0a6b15d1bad

    SHA512

    c343e95d8bdf22791d14e7cc6451481062961abc630dd88f27d64cce77c4acfd7910c12085b4076e9d633eadf1dbe590dc1eac9655679a294599432285dcb19f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1865a7800089ad429995d47050a344dd

    SHA1

    8e9fc75c88422a9e4aa342683aa6c40e7620fc68

    SHA256

    64a98020b6065b1b236cceccc05470a161d09a709689e1a26296a63ab1592364

    SHA512

    df785f3b75e921849ab7f942d82e6d60fa74a0314d6f72a6c245ee198293bd34230e59e08865447781fb23ffe5db1bc281c94280dfb0e3d8c0f6987c293b311f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    581e49a404047db7e8c95477eb4571ab

    SHA1

    ca8d31d0b6722fa0354cebf93251f6d884c71fd1

    SHA256

    d24bb2bf9ad0767c470fa74e6acb2456b9513a6e1d643c1bf181e8e267d68cf5

    SHA512

    459424f78067aa0f39c9cbcb2f26504b6ccc32be4b27b64693b31b45f0dc82b5a3fdac526e89bc8a050b4a55b85096eb06df203a33087fd0451eec9003749fce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1ab8b9b53f515310eb64c4b80264e0eb

    SHA1

    b3cb66418cc1db5c45c86e1f6ea95cbc1e84970a

    SHA256

    50ff713a42099d1eb80d35328dd3464036fa89c52dd8c86817622b17773017da

    SHA512

    30188a7b152be2c941510eba5523341f8f992eedf1b0a4228012c80149ae724458e0bd09cfe3b5547eaecf187e04c091423ea0938fe31f357aac97431f60b2e4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bc0f4d5ed584f5d4934619faa4bc3b77

    SHA1

    e87397d6b2c06e2262f17f495e0ef0dfe5eba7d3

    SHA256

    f92b8f0c387d6dfb6559a9977654b860066417aa729ebd5f3143e29de6c7bf69

    SHA512

    ffd8b1863368dda14f04a649a8c80bd0b255577e9ecdc1d982305ecb933c075fd31f703b22ad72d42e9ce82da19601ef1f29003f94c59c4df10a2db78c613a58

  • C:\Users\Admin\AppData\Local\Temp\581f982bc1c588ee8bde45af757ae9c0bf1e419ea07e5ccf63f06923054573a7NSrv.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • C:\Users\Admin\AppData\Local\Temp\CabE330.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE3FF.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1312-454-0x0000000000400000-0x000000000055A000-memory.dmp

    Filesize

    1.4MB

  • memory/1312-25-0x00000000001A0000-0x00000000001CE000-memory.dmp

    Filesize

    184KB

  • memory/1312-0-0x0000000000400000-0x000000000055A000-memory.dmp

    Filesize

    1.4MB

  • memory/1312-6-0x00000000001A0000-0x00000000001CE000-memory.dmp

    Filesize

    184KB

  • memory/1720-15-0x0000000000240000-0x000000000026E000-memory.dmp

    Filesize

    184KB

  • memory/1720-9-0x0000000000230000-0x000000000023F000-memory.dmp

    Filesize

    60KB

  • memory/1720-10-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1720-7-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2176-18-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2176-20-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2176-22-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2176-24-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2176-21-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB