Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    133s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    11/12/2024, 23:49

General

  • Target

    e3be9d35d0d99c62bb6211aca0fd4841_JaffaCakes118.html

  • Size

    155KB

  • MD5

    e3be9d35d0d99c62bb6211aca0fd4841

  • SHA1

    83a82fbda1f4f60caa6808a285e008f5afa99209

  • SHA256

    8521b5cc1129a95ae7937e32183c5ba4f7d16f4da8ee660383323ebe37d5f9a2

  • SHA512

    843e138e620ca9432cca845c4c1315830ec91484e08e603dcd7b72a234e68e5d355be57fccdd2148af466e46ec259e72f95bb7eec6616e66f45763c723f1396a

  • SSDEEP

    1536:itRTG6mtMtmcNe+vyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3om:iLP0cI+vyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e3be9d35d0d99c62bb6211aca0fd4841_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2076 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1920
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2540
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1724
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1084
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2076 CREDAT:209943 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1104

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7aa0edd9258257d7e12f88a91831cecd

      SHA1

      e145513deb3003ebb4d3456236c883bb1c0f30f1

      SHA256

      4ba9f761007fbcde5fd77b26fc5a00aad96646dfcb58977d890c292933a4ad98

      SHA512

      be3ccc4945f17271e7031617da21cf8b8ceabdaec28c8202c4695b545cbfc42989c7dfcd493febfcc8c139924cde7c1636ec5b4c32a471b3f34f043965b67eae

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d0291e2c695a531f981fc5252247f876

      SHA1

      41f23ffe6ef2da10a01d0bf75b66acfd7a8a2a8a

      SHA256

      86798aee8a173acdce000b994737dd92adde459061783040f26b59e94175ea2a

      SHA512

      64c08bb8eaef94aa53397bcb17fcd894bd3cba908b00e5f527f0e9a1cff18d407fd47a472c1cf06fa3c1765318f29099f7914bbd1024eff5b815bb5a32c90179

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ac35eee7c5414a7524d90e17ce3ebfbf

      SHA1

      dbf66d322eb23bb9bfc021f4550db5aa15c550ee

      SHA256

      44024fb2b2bb0094023ec6de18a16fd0c3b258ed74bb8c1fb81a59d18edc005b

      SHA512

      52d517eebf5656262006cfb418c9ea48aced2c6134a7e7d1f7b0362a576bf42b34d87dd8178b3c166455a096a8639f1be5c902e69768b66d9cf697bc14106020

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a5c35cf488d2338b309d0a621dd984d6

      SHA1

      e2a5f73123d845813742587bd9eaef273e01b4ef

      SHA256

      1e5faeb38d1c197cbdf50a7770081168f02cea9abf14447595925d9fbfa78626

      SHA512

      ac89738c22fd4d1ddec088e7c16b2d21f60af78421c1d5e183a37eea32f3468352014e550425149008f79ab45c00f22e3613f446a9aeb2da695df0fdb0922f54

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      39d1d5bbd30c1ebaa29e34c5255176b9

      SHA1

      bd59134b4deb57115147fb0e24c5c511e32a9790

      SHA256

      bf4b7827c4b00062e3c66cc9dc2d2294b898700f3316a1fcdd7c5536bd93f85d

      SHA512

      1b98970956ff69675d59fbfd51649a5aa186137f5d699c99799d97c3d73941321cd28a875c30726b1c8d1fc5199cc732fc4534278b8f41a61b8afdc1eba17dff

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      bc95dea0efe00d7fca3288a12968ab5f

      SHA1

      45786d74bea60a63acd423e806dfc23332aab049

      SHA256

      50522183209e2b4e97d03ad677198853d07351ec6ebb509e3d7bb769d4c31498

      SHA512

      545167d48500c15535828b88d2d2f0aaddd74572c2465c259522938123a2ed8c0d1503122775f6ca1136657656e8554e09c9f5de695061609569c451dfb15ea9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ad0be4ba29aa0decadc207dce55fed7d

      SHA1

      1a98b1d53c87f463c97e927b0e62127bd260ac9f

      SHA256

      607843a21d2ce1a73dbb224bbc9443d9b00bac8e1d666e159ec6bbe900f80445

      SHA512

      6a341ea098fad03c8731dfebc411412d1d51a7c208d9e42a97874e009bd0c8201163dba5c915ac91da2aa886f3e495304d31e565de10d60b3045b6b5d17509ed

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      68bc23c052c72cbf7f34003c1ae1dc9f

      SHA1

      fb9e335b6e838cd92e3951d639a08e36260fa533

      SHA256

      cffc7493a5785f851c31ff5dce03a41aed7e722fec9ec013d277e6bbe1fdfeb8

      SHA512

      bd4ce9014b552d6f48c0af4170040aeca930077eb3df4b1740f2ac1c91901646b28b3060e5cfdb9f2bcffcb6df7a9ad9747d1e75772c97b6e29a34fec2b73a1c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      bd0d6326177da8c482cf9392d42b2497

      SHA1

      3d0c6a0b1a7b02435cfdc3f317e2841d2a5b1dad

      SHA256

      b700536bebd6a9c9f5a397690c6f824c7b94079cc623566e8bb9d80884de8abf

      SHA512

      c63a83b0fcf8ba4d012829c5d4e3d3d80df6ce1934112d57d5b669f983cd1e279bc1845254ed13437e680875dc13afa81409d8f089b36d23df4e27d357e73d16

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      db9e7253d5aaa88e63114bb11722c4b9

      SHA1

      dc6ea9ffd428ff258656fac0ed112a8893d20712

      SHA256

      09601aa367474c17456c5d16e6319b11aa3cc8f1c5d6023d4b80f073af1be916

      SHA512

      46035a129efd1b09d3d9ecd5ab5a6e60a3f22cc8926c0327acbc9a8079c7dc734e3f19c9555d87cb40819575b995bc654219039e31e3800cc55a0cde071a0f42

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      08b1ee1368e92b92bbb254d5bc1e41da

      SHA1

      d6cfeffe15770390b8f612bf7f6ba544be990e9c

      SHA256

      b9abae0ba2e08d44f8058b9258b57eedaa8cc71d08a242deaf7ebe77bb6e6d49

      SHA512

      50b1ebfeed6fbb50e19112a24cfddbfa1a1931f9be5799d0910b6bf08679ab71988aec7580a34d379b8b008bdb26678db021abc9baaaae776bf80bd0287f74a9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d1389e1af73475d5c12cb0f2b65b501b

      SHA1

      223684cc233d4a15b85d45cd2cb12043a0537819

      SHA256

      102041119a3bc812f2de7370a3f8eb1284b86656e719b520d1f9b259f078e124

      SHA512

      1d7f946abf5489e60f805f0a19c0d1bb4c378aa45cf96184a284f7e334dafca7f3d7ebc460fd1b5d317e0f0c849fd389bf109474c6a2a49b8230ab71b983b110

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6eb160e9cc0812c2f088ceadfd666e60

      SHA1

      d919514aaa2703eb4293dc6fcf5e68f82feccb87

      SHA256

      fd68788671842b43d4e135530c0f50721e6717a91e4b5ecdf4e1e7606c0613db

      SHA512

      819cbf50771fdb79263dcda2973211247d448da271bca8ec62473695298288b9fc7ecb5c0789a9b47e6f550d477c3b2dfbe6ea2c3df767a82115e7f14a6c9df7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      697d2e833180b65c3976a96da6e331c8

      SHA1

      0c6c7f4c5cedd22e01d8671198670f26b59345b6

      SHA256

      4267c75958bcba1bb55d71470eb14c0f033e8daa646ac3d892f69878af51d5b2

      SHA512

      e4fc9d673bb05b5c07f974a206e1ed2eea714b52c8010bf448e554f79a8a24f2b1e7afb64c40cf44f6fe2a994fe052bd593c4d3f1c9ba645555009c55c085d7f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3ef59224b9067303e284745a005221d2

      SHA1

      6c0f0cd2803d16a03544d3281767fc30a2588f1d

      SHA256

      723611ec2b38b66f34b19727af631c4c4bc1158faaf26f086aca50ae09aed99e

      SHA512

      ab4893d6f9ac5982308d4df8f909fe8a32731c271ea4aa8eb4588f69390bb6c2004520b84022ee71c751049a755c1c5e511bd2b95f270015fbd6f6bf364f0471

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      36618ce065d32e16cc69fdccc53f6dd1

      SHA1

      985bae65724990f8c35c5c3c95d235d45f9c629a

      SHA256

      718fe7c83246180fee1ec5ae450b80c9e1188d5e9e4287e0270e19e052002a21

      SHA512

      7c7e74b9cff7bb735429f7cae23fdf5d80c6ff803ccb9371ece0c08e98c3dcd2247f601a4ed4babfe9a058e99ad1a0a8bf3e6f6e5612ab2210d018a5c612378a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6ba82ecbc8c68fbd42c1d3ca3d623c2c

      SHA1

      92812258fb1bb6615e03accaffc5b799788c93ed

      SHA256

      322b49d09297d02c4a00774ced87c7522e21f4eee602d50bc57b5fbcbb28a50e

      SHA512

      631c4a3eaab4b9a400634f1dafac3489e277956bbe0edce0cb8ab868988703d851230eca79f0da575b5abd3660a59ce4d1084ee38a3f8600c6063efacf3fe741

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a81ba9164fb1ef1cefb7355a9a7f51bc

      SHA1

      b97b758bd0f14103872160b3a7dc2ca2d5139827

      SHA256

      00a000dd862df80a84e414ef93200d264657b3c5e1ce3bf6e5c9582cb12a943e

      SHA512

      41210fd8af8e80d286afa905351ad80e0b1f07cb48b0b9bae798da93deabbf50700c3f28b9b77b4dec665cd09e05beebb231e461cd962e7d302c5b608af4ab17

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      846b8d473c0c03882d066b643f496f21

      SHA1

      1b635253d3129374e2ef8244c772f6097f8b8395

      SHA256

      add46af2715e0eda2c50431d6991178960a71164c88ce3ff57a44895fa41ef51

      SHA512

      5d4310d8d1ba0fc33659ee2fc0796d823efef306af5c780fbfe566b9005b548afe112553d2ca55a982af3704974ee8bf3ee91b2e49d6c9f680c283454ad9487b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4981b708562dd81446f26f6131f446b4

      SHA1

      ec5579c5099c23326bb8af858c83c750526129ec

      SHA256

      67ca98447b721e86eb821409d9491fa209e77826c1ec8bf6639c1a0a346b355a

      SHA512

      5d81a414d689fa1af25f8fb7e115755d3ab53d849194fed0bec5e3d726352c84e4c5fbd74d2d5618be225b5b50fada49eb1b83882911d3a972ed9cec14697f8b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4cd0f2afd5ef0dfa200b3046e7c0d3ae

      SHA1

      b23fe80a441b0bb8f788f0c8da2d0cec287eaa37

      SHA256

      a0ede2d5c7c9a89a6921c322de52363d3a5cf3edf50d609caf65a6d128c571b0

      SHA512

      6e3f6fcb2ad18e0dc3cd3b045cbcea983d70f8aaaff689695d81ddf1e3ada76630f2a5c688182fb80386cd343bd8023be096e5494af8d8622c3cf351611d2de9

    • C:\Users\Admin\AppData\Local\Temp\CabA8DF.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarA94F.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1724-447-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/1724-448-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1724-445-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1724-446-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1724-443-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2540-435-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2540-436-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB