Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/12/2024, 00:03

General

  • Target

    df124d3296eba927ada9a05fa386e10f_JaffaCakes118.html

  • Size

    158KB

  • MD5

    df124d3296eba927ada9a05fa386e10f

  • SHA1

    f1d7e6e24f28fb81277025ea989e4e65f470c049

  • SHA256

    97e01fe9967901ce3b24f9ecf9dcb936dbac38f6a4448bf5f9d902c810099b24

  • SHA512

    87808b0ee0d6772b693e0dfdf68442b41e0dae133c3c5da2c3f988b0540b820886d508f03b932a278ba5778a4ff08a6df220a2dde717102a150c6a02ed0b24f6

  • SSDEEP

    3072:izKIkNKqtyfkMY+BES09JXAnyrZalI+YQ:iDmKq4sMYod+X3oI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\df124d3296eba927ada9a05fa386e10f_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2692
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2692 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2672
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:764
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:832
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1640
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2692 CREDAT:603146 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:356

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e260995ace9f0b2d4b1768d687149de1

      SHA1

      5c3865f5d4addc4d33fd80e7216726a216b6dc3f

      SHA256

      3716b8b52714e5debf8d152560156bc2919d76e0ac88193ccebf7d855843c7f8

      SHA512

      75e290bb178986cc93676714b259f530d1a270d6dec367ad24cb46edc63fa2004095c205155fad50400f042bd3bbd93782b75d90e8787fbd9ad0773e4c3d7c5b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      aff6773f75e6851480917d673a9dae55

      SHA1

      3ce6e196bee8173aad41fc58a9282a61f33d99de

      SHA256

      fa22e2122f03366a6b9a6f28157b61a692638f1cecf759e27808065470ada64f

      SHA512

      bd10897e5c741c09e03c40c9081ec2de4bf19e8947a6130ed7b32b316c01a07071bc933a833581d509e57189aefef6e7d184ac4f15478a17fbe7384d13760940

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5ea14c14b23c610a14bc971973f28c29

      SHA1

      a1b0bcd9d40b9abe3bd74353d8a41486f1e9810e

      SHA256

      c5fe36f88163df42db073ca1fbe91628092a03de599603044373faf672267fe4

      SHA512

      873037ff49b91e3e18eee4a7bb0e8bdeb96e85721deac573bf0aa39e725d7b530c1fff06cac2e429cc15cf89f86b1ca295978ae5a713fc67b89a897e6f2cbcb0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      27fc04a7ec0f1e61e91812cc2b60f6c1

      SHA1

      15f02b556119ee8d2099e24b411120ca483b04a3

      SHA256

      987f56aa2670cb4c4e1e28badffd0ac7411efb6e48499513c07567c2f827c83f

      SHA512

      d88b46722818a765cd62b737f3c60d0627f79fc87580af1f4b67d9028b5fda485e2b2259eeaa627097c8b677f8657f96e1b0ee71360b96fd01edb8c9e077b7d3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      08cd89b0caf4967072bc70924212b85b

      SHA1

      c141dcf5cc2587f49954d57b869e085490898ca9

      SHA256

      136a7e64a9224f7afdd0dd70b064545de93db995f8c015e07f48f9a1e8cede1d

      SHA512

      f387150bc9a5171c92414f55bfd515e0ade3e8631866fda83a681eb6713599e9d38eef673dbbf75b21a239725ddeb5d8b350b4cf09e5f1f3e5be2b9705165f79

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3a6e583a13fe0cde0e30fb9110825446

      SHA1

      2f5e85495b4c1d055d1e432a1a182a6c45c90ec9

      SHA256

      3e4c14da3a9fe57b02a8660993be5f01de7d79a2c297264ae2ab31a20ac47cfd

      SHA512

      038319e2a0614941a61d58a358b9c677ee713b175f1330f58efd2b38bfcb6ad963a834c7688bfc25bc0e60c55fe9678ea20bcc076bb8d165df7e96f8f076c280

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      fcdaedf90816ec87e2824d272d5c5044

      SHA1

      2cf8f308a81b7289f1c75f998c3b6fe3eb799cc3

      SHA256

      c73484ed6e2f6c7348b981ea3780a22ca0d68bdd6dd4f432b3f4215e8dab957a

      SHA512

      b3e94eb56d41aa23ef6d8e56c0df2e99e5cc971156c71258aa3415e471c100b49f099459228541162faa0502045f2c2d1730c9e452df02baada61b80ae512d3b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3b4ec1a036c089264c1554034e332e22

      SHA1

      c04cf113b6ebec34791c61469e5ed362b102c58f

      SHA256

      bf3e167dd1ee5fcc122f399c3e18ebf53fc2dfa0dec6fe1cb00992b2439b18b4

      SHA512

      13f24e754fb004f15b4e1c245425d9534f9bc3fc026fb350fa77a2ca3df52c4837e274143e0863c993ce5f3c7201a4489a643c204f438773d1d795ee20fdcc1d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      484501e44891b0595f7a90cf968b3452

      SHA1

      03d80c1c660a54c1d87b16e62ba92ce1f5ccee26

      SHA256

      86d6c55f599648f0fd7a7ad6e1b32379fb25bcd6bb031d7159e46b0e63c37677

      SHA512

      f2dad0b4f4c8da33a18d43cd980aab99b690c446060275c3ec289f9b2e59841ca4e2f286c2999d3a8fd83f6e918e41e28a43e9d4ce52b31a4c1d7770496eee99

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5392ac240d75e480b0b6903107f12500

      SHA1

      fac0b91f2092dd8426b790c1d9476626993fb59f

      SHA256

      781b96726a1be0241af932ce92bfce747b9168fd5de5e26a166da73b34a474b9

      SHA512

      0a04c512c796cf93db2f045e56a3155801ae5d237d02388cdd4d2304fd8b21e1d39151111a778bb4fac75dbedf970b1e62df117f249a89b383a1d4b5bf5b53a6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      99c1177551c75bab4df141e7cb831ec6

      SHA1

      992e5dc7610769fd567a6fb57bad4a16a3d5196a

      SHA256

      94a4e4dcf58e96176761c5c14c109093f1f1e1234427bc648f8db9856cc89bc3

      SHA512

      46780ffbb36661122f4e81f46095f992d249f1c8df5e56b0a6408a2ae4c494b34b1727b599aba518a16ba888458bac108e0ed81bc8b9b5653ef910d035fae290

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      77ae1b47f74567d737908e794b765906

      SHA1

      ba17337e4f22b23a8705d201fe0f2c6c385457cd

      SHA256

      21b3aab3013b2c6a527cb0c8fbc817b7db920ced0f9f52068a8c7c6e375204fb

      SHA512

      04245d8278ab4b8692dfb88ee2a827d2690d87aa71391f066bee2fdb5cb1bc367ae38f07a43d7241d732f8e7cfa7bf188ebfe164d37ddf62a893619581075bc5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f047a19dfca5bd42e5b154d0249e9fe9

      SHA1

      c1d56c92901a14260524cbeefb2476f502847a11

      SHA256

      5e568647094a177df49959c4c925da4e8989248d0208bf99da89c4335ff648e9

      SHA512

      f2f03ce643b3f9d012cc8f29e0c96cf8a272cdd9ef45b545afc67240b1e8360b25f869f9d7ed78ac1aeca40dd3548b0293068bf956f5551ddf2565ef75008262

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b97f132b40a01b11668e08fff127a6b6

      SHA1

      18d0552221d31286fd87995099b591d9bc1cef74

      SHA256

      ca4ad4b7c9dc7f95c4179fc920ff86739121527af9a179c8dc2b2d3c85ff2242

      SHA512

      9db65c5849dc0c19dc22d0d4297e6d71b2ccb176b8f3068e94c344308f1054b3c2fe56fd97aa92ccd5328703e1a0aa05638497eeb69bcacc084fba8acd90893e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      40361f5e005b1d580eb880eb56bd2cda

      SHA1

      6b776f0ca7b3ef9218281b45a48485a9848c220b

      SHA256

      056a938b52c3ac21584735251a4890c1cec03f76c864ce6dea11fd75c916ae40

      SHA512

      465037d55c975dd64a6e4ab327a76e107570b85a78ee0893e6963634918bee8e8059e6bbc6e8dfbf36f977505e8ceb17bb7705ba79ef93325b9880749c1f4b24

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c8b64523d2ba9ec33e9e19fe5fbe3009

      SHA1

      20217ecca822c7b2c81360fcea76a9a08bd69216

      SHA256

      372bda6b3bed5b611c9be9c9c329b90cded375bf13ff23c2531efc4526f58b83

      SHA512

      8ba03aef547cdaf7aa3a3542c27a11bd196cc65ef9f0a140e2e04b10fa11bdfb6452c1ad41830e1e03ddc253c17400e5f0a0779293e9d6c3772d39a1de976fc9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      644e886a121572b381cfd79dcb6d4f93

      SHA1

      3f4761136351dd28319fb417d31bca540a6a73e2

      SHA256

      021d0dff14dfabcb1d14ef863e95a2dbe3b2a3e95c955079bb3d356422d80b3b

      SHA512

      11a4331938faea6e3ebd0ba954dbf021f8047fabaeedac9f0da347c8bf4722ac27e06bc7dcacc786f0db222d7ddc5e1f161e4a7b16961bf6de6ed106f9a02260

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      198747a442a034f7c9e883fced6a2d49

      SHA1

      f2ab9de49fad411b437d77b0e3ed8181bc4aa872

      SHA256

      e8355915025471e1faf12097cfb3a0750d79d9735dc10d8e016ea8e2238a50bf

      SHA512

      fa17df39eb2b3534e4d18fdc5c1afab7383d6bb7f562417b593ec73d18d4c5e2c26a217f87ea7c35084ba777e79b57b62ec47d77e98792469063b276f19f9a81

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5cb16377887fae5c56534acedc8f512e

      SHA1

      6d761f6ad6dd94d5e60866e6939de4c34a0ed46a

      SHA256

      4f3f6a11ebb6359b0187b51792c02bb9d8b1207278779f2a4006211cab29681a

      SHA512

      5da7462745705160ded1868b9ccc470ded34af1bc995cabd44880439abe5c19af2e61e3ab80c099a569979fb794ffd794615494cf98c252a8134b299ee1363a3

    • C:\Users\Admin\AppData\Local\Temp\CabF05A.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarF0F9.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/764-436-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/764-437-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB

    • memory/832-450-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/832-448-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/832-447-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/832-444-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/832-446-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/832-443-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB