Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    137s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    11/12/2024, 04:25

General

  • Target

    dfdfccc2ba614c4d7d6e44e2ac1a64a0_JaffaCakes118.html

  • Size

    158KB

  • MD5

    dfdfccc2ba614c4d7d6e44e2ac1a64a0

  • SHA1

    ed5151c10e5fdd102fa103044cf990c585731b58

  • SHA256

    30e65a483cdef29add4b56d875dd82d9a78338d072f5628ec7ed0af19f0b9582

  • SHA512

    da98dadf3940f495ef08f7f18df834c10435c7a32cd5e5d30483a679d7e026b53c63a70265c431f1bcdccce82a5e803358333aa25c8442ec48d194b9a43eabaf

  • SSDEEP

    1536:ieRTgSwfrsAoIjqyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJA:iUghjqyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dfdfccc2ba614c4d7d6e44e2ac1a64a0_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2540
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2540 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2568
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2320
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1420
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:872
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2540 CREDAT:668677 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        PID:2284

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d7201e7f55643def83456b661fbd4cc2

      SHA1

      bae875dace1e07ffc0e1c9c5abc48870e5e78846

      SHA256

      3271b5868d47db702cd9e00bf2beca932af4eaaa20b4f3bc259c33c57391ab92

      SHA512

      518a2ed9a174e32dad10f041622319c13e9ebfafe77b0138831f0b5b07fdd7e8694f2abd200f1ab65fae9027a13c8b3910d4c6e7c7f9ee38238bd82288f2f494

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e5ee4e9c20fa008e0b254554b7ad1327

      SHA1

      b96b2ad2e31ccfd861354c17f7f90317810a0f3e

      SHA256

      822602b480f39e99feeb00d23529b4d8f733cac0b61c6ec6ae5e25464e4626a4

      SHA512

      1ed02df99b34b22f3c3f1d0a16c7cc7a4a6261eb61eb28981f3b65b786e53e4b57640acde8d1d1e641067083393cb4feee7745e6a6a88789181ca4f6a4bd8479

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7402f1eaa42503692c0f55994962221f

      SHA1

      476252b815674a57c9c6cf6bef9f9d9494f53007

      SHA256

      4498464292c1aecbae3707a12847fdc811da9e4a4ef7bdf8458364e3b87aaf1c

      SHA512

      23d8e6a135166e7e4695c490512d75129f3059c452be0432f714defd423a63161cd6bd25cefbb9a69a5ff269732950e6ee797325f320c79ffa4562ee4bc5835b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d0e9bff94c9bc745537f75eed8ee46ab

      SHA1

      f0e25128ab513b419ce463e89fd8d8c0e7f9b266

      SHA256

      5b7fa491f60128b3d7af14c5363f2cee60cd3caf7064abe68d32f852e2eb4961

      SHA512

      3fa86a445747de98beb10857cb19947f33ed119b2d93f1b6396b54b25797e78af7f4b87d0d073fad94ba9e5c5ab025ec46c4ac045c3492851b930e294e4bf0f1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      04174b45c2855815f70d0a8840a6ec3a

      SHA1

      fd67f581e848f5b615abe38094a08658402879fc

      SHA256

      4f156c3e71f08c710178f675b9eb025584c9aa08eb71151183276e5c9449302d

      SHA512

      0a4e7dec7be3941e1aa889ca60b10d4ca50e09d8fc0d4eee5d951f68ed31ef7726fb38ffef1ed363c0ca28daeb2cc402d93077cf8fc693c46ebf26b6f1061b60

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2bc5154d986cfc98090a7512601a0c4f

      SHA1

      ed4feee39bc300d9bbc130e1ffd74994184ea8df

      SHA256

      4642e1ebe111ff8ef23f3e5f39141e44c338625525eaa57553cd282e6a08f533

      SHA512

      94c9dd2d18c1363da4417fa10f5e6028fecd1e6200cccb6a35fc10e39201fc18c294ead85b13c191255bc83ca2aa0437c496c52ff4f070ce0c28971cab35b6d7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5c94f712642a10f80629c0449c244b18

      SHA1

      96656db19db73e201a68d09f606628b27cb9d6d1

      SHA256

      d72e2e313f896cb3ae5d028cb3c091b6384e23774039795f4a5b8602525b02c9

      SHA512

      a2af7767b2a74d0a4b288a1e958d919e590cc9ede51f4deeb8ff5ecada09976680fd2bcee96c0011728b177c3672e1d417dc7b693d196b254d1de2ce36e98d45

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5d37f22931310efbb1c5b4680be62b7e

      SHA1

      de64941bcd1ff8ddf53ca6e18ef766fcafc627f8

      SHA256

      9fd2ad6a3f251a7fe039e3d7c90afda89ec3892b75ac8f66b88fb4731a5c415f

      SHA512

      7905b50cd170717abf8edc904c0875ad5f466b7139904a64ebc00ffb69cf23f2ce867703fab50a892a39f64e3f54ddef2fc1e93231780db8fd33406d2ab09b47

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a04ff5d24e55d34f0f0492c2fb872e59

      SHA1

      1277d4ac0591d7c7d23fb5e44a00bbb1db1a75ea

      SHA256

      e25606e02b2c549d195d08364adba2c537e7da6365ebe1e80064dcc5b61a6c0e

      SHA512

      9c7b4cbf1e2aa924958e6ffdd37c8a05a0e67f2a9a9901d5901a86c72992fec7e7a0e0a99666a1b803cd95582171539b693500e1b422e5c56e16ddef1438b918

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1684618eb00b85fde21f85ed3a18f51b

      SHA1

      7f18f846df7853d42b96b3c60d0fc569c8167883

      SHA256

      d35479495fd02f9df244faaa606314c0542599428c54730260d6426094a73d51

      SHA512

      8ec6915ac9948fedb8b35f551b37f7aafcbee458b5442db82ba0be24e09828b09716e959bdbb687cd6e024d2813b49b954c46634e9806aa25569a155343d1d5a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      16caa0daabc04a004f9ae0b4eeca4395

      SHA1

      eef651a460456e51d3b01bbe1aa0684564ca5ac7

      SHA256

      b3df94d962fcbf8b944746a19e8380f3e28074de2beb733447cd103388ba9faf

      SHA512

      07edcd34b8551ac86718c66b2019a43b62a57bdaffad529cf744d5cf18d973b56d3acd24961985746996d8758562fff2ec6c9eae5604b2499ed84858fb7daefd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      faa0deae4836b591a1787735f6648c47

      SHA1

      0cbf61c31267fa2e7ca381e8e7e3fb856e22daf2

      SHA256

      9e71d788cdb6abe15d43be34d0bf416ed90f9c41c7f470e2a39e51b9ad9133ff

      SHA512

      7b3db5815ea264684c3d6621ca5eb702bae0e6a2015e5ccba6ea6ad1a17f37947764b2a2eb639d3a8f6590e8408340b56cd3a155f1197c86779262e6b83b9245

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b90a18527aa6cdfd07e70646063dafa8

      SHA1

      d8f761131ad3667c55a21652a1ef5553d3f840de

      SHA256

      5ade1b536a184427ed4aab941610eb956a524a18a99311e12f6c6d80e475a4dc

      SHA512

      1529e1f54ef31d197834136e6dca844ddeaaebfaaf95fee8b6cbf2fa02e58252adc48562b1d876eeba1a079436996be1a29bfa90ecf7dc87990a37762605351f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9a1c0de0b51f8afaacd1ef21f8cc97b0

      SHA1

      80cbd44fca090da2ebd418044cbeaddb971e8b01

      SHA256

      645462a5192898ce9d6b13b6838115397a0563b73544d7c57dfe060c5f5a94b7

      SHA512

      effa27839621dbcd64ba8c06dfb486104ea20827918fce58a8d33bc18df8a0237a40fc5615fce907604980ae64b2534b8bb2f527de2eabf81de0be578ec81a3a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      115e1e16d6c1b70a8e0e86cf18fd4e10

      SHA1

      09e472954c2ac67aa5e7f88043c465e210e0f378

      SHA256

      a04c67bf6b0348539adc6e1f5ba8d3a6ee0b3ed0fe3b67087f551c02628bdfee

      SHA512

      f276ad47ddace207d740db3bf293e7d69c485c8140c00d5c78e714b6090a906a0913e624d66cf646ac247c46943f3441dda3e775741c0d686d8cd09d79d9e4c4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      44fc7c8b6d786a60cfab151271dd9456

      SHA1

      03a7615b3724e7759963f59d0c3729ba565c0386

      SHA256

      7111c0569633e25742518f2da8f630fb7d5ad547c195e5678eb0be92eee861e2

      SHA512

      47095ca4edf3d02cd93dd66af88ef90b91301933ed9faef88cfb33ab62a067287f459f71f55aaf1439eba7e15862ddf58e9f89da4507323b7565bcf4dc6f4dea

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f13f53f3cb778adacf7d67f1b02b44a1

      SHA1

      09456a813bf581cb569eb13a92723f07ea7a9790

      SHA256

      4f038837192bb9508a0ef0a340fe008a20d34a42828c39d474ac6dd48ea52b56

      SHA512

      734a09342a57baffac946e1eb0e6403dfc913ee673d79e67e154e4034dcbd94c2beae9c2e65d436ab924c2c9db59a0d9ebd7efed0072cd4b552d51589143bb8e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b136b55eca3c61048e8496d34dd05215

      SHA1

      23a286e968ed9a5ae63611b014e423a8eea8bd4d

      SHA256

      30fdf082b8d5e7000919dc744bccc929ff4b0b78c51892a473ea43211cc0efce

      SHA512

      a4926c54eeddb633d52ce4d391d96bbd5ecd24a1c620f2cfbbf379a40714a71bed2c72a2064ced372768bb40ff7511d41bc4c8aac4a6b59820c72d3ba18bc686

    • C:\Users\Admin\AppData\Local\Temp\CabD46F.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarD52F.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1420-447-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1420-445-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/2320-436-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB

    • memory/2320-437-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2320-434-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB