Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    128s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    11/12/2024, 22:48

General

  • Target

    e38fe53e0fbd858e4ddc1616ac15d847_JaffaCakes118.html

  • Size

    154KB

  • MD5

    e38fe53e0fbd858e4ddc1616ac15d847

  • SHA1

    c3f809e2032ce445de32083283bd51f9e5ea8372

  • SHA256

    ec9b163cf4aa5b20766c87510724e1e566960f3105dae722cb2260988dc839d9

  • SHA512

    db1c2e682bf586a2d87a7adb2e77421ea454a7d84bc1dd0ea1b4346e9184cf6ea8199a8036808053411af5548e43fb6915bcf3506fc686c2576b8bab9bdef2b7

  • SSDEEP

    3072:i2cbxfs85yfkMY+BES09JXAnyrZalI+YQ:ibbxfs8csMYod+X3oI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e38fe53e0fbd858e4ddc1616ac15d847_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2772
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1308
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2480
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1956
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:406539 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:112

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ab9781540e7ff72dc914a3cbb246d156

      SHA1

      777f8b45315aa2d9427415449832a44dc72f5c2f

      SHA256

      5286f31ba8d3b650f7d3e62f2dc919eb78332b9e59f4d604702a83d02785f3f8

      SHA512

      5da8cc8b858d6f278dec01cd7134fb30badd322cf503212bb7d300622fe4398a7f2d560e3384660329fffc775801687ce23d38359349c153f00e1967cd189540

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a7e1d447f984fbdad9dec949388a9ac6

      SHA1

      d7e2fcd625b446e6160382283887f297acffd307

      SHA256

      0f4fd8ee67e396092fbc23762c93949cfdcd828220b1f2e4cede968fdaa77f27

      SHA512

      22632e010ef925a731c1a089d5daa374e0d89890ba7124a21f61b2d3032781ff8f9cc54c16d0000712b62b86dcede4236c4fc0d66dde298507b071d9d8bf1d36

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      cfeab4b5245586095b9ea6965d529ed7

      SHA1

      c72235f03957df16b0c52171e8fb66c715b233b7

      SHA256

      1e16b43d2c2b6c5080c5f0a5b83a49d32decabe11ec755f14c73eca45777f8f2

      SHA512

      8438633fb10a4cd4635087cc87f8661cbb28cc19e51b64d44fd26fe778564b9b849550b41330d8d85efc83873542271f366df59354a435f5d689bf7d48eaaa15

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      87acadd0225032f4fe90236313e53fe9

      SHA1

      771799168073e528cd8b4a554124bd9fcf078ae5

      SHA256

      3b844530d28dfaa5363a7ba3b5695e7d21916468e7cd82a0eec00086ed2fa41b

      SHA512

      347346fb9b539f97d8dfa664eee94cfac86293f4b5eacccb8abf45719201aa02ea44d5102c60fcb0b36d221cde5e6dfa70a4c3d8811704ae6220e837f4f1066a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      fd8134640e72304b578980ce74323670

      SHA1

      36cb3f4de5dbcc26c7348667977c93606e70aec4

      SHA256

      0ff0761591ddcb63b89634f0b03b9000dbbfbf38dd9dda7c812b9543c740990a

      SHA512

      5c18d0028d763a5e7bb35d430181b6e425ba58d394bbe779831a2c49e3c9b2f826e24ac3f1313f479ecb14d9b9144c663773970538369d10275f18ad7e259184

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b879f1d134dc20b55ce48fb6d06833f9

      SHA1

      94ee6eea25cd15484f893b0a4aaf6a736f4f6498

      SHA256

      7c2e9f74b367b4a0031371183674ff0f43960d6fb6bd56e49553ce8c0aff9ffc

      SHA512

      1fc818c85f1c74d321f54211061f4b37dcf3ef5b9b8251b53b3899d49a25fc6b1ee3a7e4ed0cf6eca61918141cbcf6e721bb6b03cc51ae090f3b25a08d6cac5d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      304c01a22ce3ecba2725a3d85eb6b54d

      SHA1

      ebfedfcd56b7f1c0e64925f473bfa6e4bebb4330

      SHA256

      e3cab1de43ce22ef4d5398969b62d370795b4f2f9a86ce43d8468fbed8cba75c

      SHA512

      346552ae9ed925c01a5b77467c296d5a327bd1673f3a9f50cbbe58dfa77b1b46417a02b81ae54216f8617d2eb978423bf0b94c064d89e4ab06001dea551c35a4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f1de1750a41f29a73ce7a4d4a3a29dae

      SHA1

      1b1e0f890ea2820bec2733a942675bd56fb74e9e

      SHA256

      0fd15708115a361d7209dafe5cfa5f9c1b56eeb6bae4e5dbfc33e7c593a0f493

      SHA512

      3330f86a053e3df7a1e4f5b52c78a7a67478c15fc71a61bbde94b2a1b5f184c25a184e174e69246d1ee1bc809cefcbdf374ff947287ddaf3092082dbd9cf638f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ce7c61b1569908aec8393a7c13c5464c

      SHA1

      3fa1e3e4e73d573a3a22cfb2f0406df59db13648

      SHA256

      f15540ae75462989f046664ea80754f297ba6ce54c1fc1f1e3f7c58eaabc09e5

      SHA512

      ef457922cddd77fee4d08e9e69f99d80dc5ec17ee31b9241e4e45782c05453816c2248f7da0aaba604a8104cf54e2a08896e678134127b5d18f782a1f93fefbe

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4c8500f9b77b146abb2d17f30f88c04f

      SHA1

      07f84bb83244ea746f6912a7be119cea9d9ed7ba

      SHA256

      af5b6a49cf1a00c4e13ea17508d3bb53516528d060aec8420d910997f326bbc2

      SHA512

      baf6abbe2e69d57103fabd8686b6391b67cd2392def5aede6c2a22f92d3666ea0b6c21f2000c1f57d8a238e129df1c1e9aaa5a7331e61cf2c6d7b459bd836234

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b3e1f0ca756bee75c42a80eed4b22ff6

      SHA1

      1f15dd652577b39d91eb6bbb3f651290b5b5aea2

      SHA256

      9938d3ed7f7e0ccba7da0cb411e35e6f2f66a91af49ce89e2afc373eca0c5eb9

      SHA512

      038452b291bbc1d20026238b41d4abc5259e11e734feabee06a265cf787da506586f3c17e8e3cf00f8ffe551282e5b22bbceb01e0d59dcbd74a83b65167dc932

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      45b9909008d85e8bec734886aeeb8229

      SHA1

      592e563252e134bdcc4e26c2548ebdff66258260

      SHA256

      a2a276132e29da48207faade0659d7e6c4ea5f125bf03f0d913fb8dbcdb168d8

      SHA512

      9de9856cebfd338813b3b0ea9072f2f092e6176923456457f2034d9e6560c2507bcd6f991b969705f5f7379931525d92b313e63cc89d62ef8955ef7b35e16e58

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2d6e061ebbf11460a5bc4978faad86e4

      SHA1

      f0e97c3cf1a2ed85e882e7f5457f13fb7e00e021

      SHA256

      f137c9aaa5809ed47da0bd93da456eb008d6ccf50f1de87ffcb44993d2ae7105

      SHA512

      a7c4c272d0819834ef1b6b540dcea9a65d231539e2582e1ece943ddc59cf07f5091d476945084d316819f8935a8484c44d8c7523ad022ed8345bf3c69f0a6347

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7238f076925c9c7124a77755c9ebd3cf

      SHA1

      ad45fcba623bf9afc9edc0af42bc69f6a50db736

      SHA256

      c402d58de59cc0285d87abb2c0f593d743918d583cef9c08887935402e693edd

      SHA512

      649160ee8204ecf2070de517b0e286542a8e76cbca0816a73d7e1e6e9b8ca488f4d63b731684c814246a5da5c4181baac05b0b3497dfabec86488a0c4df18945

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      fcf6dde52981cbbab7f44a3603cae7cb

      SHA1

      8ca4a89208c24fea4f362c07bfce84df39f420ec

      SHA256

      6a1d9fa6f81e675b98a5f56e0bd46b7079649d43eb947cab30016ca072e9ab65

      SHA512

      3abd6dd702c6a84183262d0bca5e9a3f18926a275b51006951d72ad6dd219ad538a59a8302dc327267b4859c9b99248c730f19944c769e0509b1f856d7efe6ec

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      59edd71b25a6ba56bd2de9e13eac7fb3

      SHA1

      25dc866b4e5e610ac0227612ce7c6c05129f61f0

      SHA256

      feae00225bfa6ec13018f563364785419ebffb4c9a8e27e39f35d26b877fffc9

      SHA512

      1b16295cd31476c2e75d9450f8d9ef983b8a2b1baa632f70a1e55cb9063de3a834ace7b77113bb331d73b2a9a659f519a288f27d846c3caff504af7e8c065468

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c7b4a866d04c9ba9a18fc63280b3206e

      SHA1

      30b043f060cf06140b67bc734f17f7f69b348caa

      SHA256

      266606613fe91519200f8c36b5addc5285f0c4177623b97b817375ef4dab39d2

      SHA512

      76017753c780247e72779eeca9098ee4fac6b02bd322da19c7654432f616f9f1598e4f157cb077156785aa9ed5589d4c3628841fe07b394165bf7deb3399c82e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3e118671c0a27354e1392c6d8a53893b

      SHA1

      6757b2106407fe9d96ed4988de066a9c255eddbf

      SHA256

      c8794b94d6360c012fa71acda1f5cf283eeb14e65bb8a9534f6b47639efea35d

      SHA512

      08eb65eb5ebf5467988e9c4368eb43d736ba32664d4550ca44a4b0a9babe9152c548bdffdb0b29b2bf31a7cc3bd4fb35a89ca3bcac294da8d9d0bb5ce2df2a04

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5e81c14d528289a1c7ffb33694a8b016

      SHA1

      02588a809f3d55746342653795d9c84e8e1a484a

      SHA256

      1ad29a70e58882461739a2cef3757a8b2e5e7127b5eb11e9a0ade84b3e12e96c

      SHA512

      685f68f37520663d77e9a80e1bf11ae6834f0eebc697020c93f56e92819b60ec200a9f5f51efc2f61b929d7082f93d9d403e1d4e5ea7574e4d2249aa5fd493c9

    • C:\Users\Admin\AppData\Local\Temp\Cab45C8.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar4639.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1308-436-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB

    • memory/1308-441-0x0000000000240000-0x000000000026E000-memory.dmp

      Filesize

      184KB

    • memory/1308-437-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1308-434-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2480-449-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2480-451-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2480-448-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/2480-445-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2480-447-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB