Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    91s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11/12/2024, 03:52 UTC

General

  • Target

    1857c1dd7942a15d31b1d9b8eaa72749f296221402aa659bab6a1b48e37f4122N.dll

  • Size

    500KB

  • MD5

    d274670f913543a1596c9ca564938ff0

  • SHA1

    67e4bcf0912dea8125833f7aba776fba90d4186e

  • SHA256

    1857c1dd7942a15d31b1d9b8eaa72749f296221402aa659bab6a1b48e37f4122

  • SHA512

    8a384d715b7afb48be50ffa1cc4ea833417f051702515757b8cd8e945785ef1a5f919b3dc789da84f7ea740ee3127f87c189989959ef82f0f38ba6bf2c8ef58c

  • SSDEEP

    12288:Ph8fZLyb9PzVMBC/HVMOp4PkxHLCYwZckMQMNoMlYXN:P8F+Pzr/Hfp4MIYwZckMQmblsN

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 3 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\smss.exe
    \SystemRoot\System32\smss.exe
    1⤵
      PID:256
    • C:\Windows\system32\csrss.exe
      %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
      1⤵
        PID:332
      • C:\Windows\system32\wininit.exe
        wininit.exe
        1⤵
          PID:380
          • C:\Windows\system32\services.exe
            C:\Windows\system32\services.exe
            2⤵
              PID:476
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k DcomLaunch
                3⤵
                  PID:592
                  • C:\Windows\system32\wbem\wmiprvse.exe
                    C:\Windows\system32\wbem\wmiprvse.exe
                    4⤵
                      PID:1344
                    • C:\Windows\system32\DllHost.exe
                      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                      4⤵
                        PID:1472
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k RPCSS
                      3⤵
                        PID:672
                      • C:\Windows\System32\svchost.exe
                        C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
                        3⤵
                          PID:756
                        • C:\Windows\System32\svchost.exe
                          C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
                          3⤵
                            PID:808
                            • C:\Windows\system32\Dwm.exe
                              "C:\Windows\system32\Dwm.exe"
                              4⤵
                                PID:1056
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k netsvcs
                              3⤵
                                PID:844
                                • \\?\C:\Windows\system32\wbem\WMIADAP.EXE
                                  wmiadap.exe /F /T /R
                                  4⤵
                                    PID:2064
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k LocalService
                                  3⤵
                                    PID:960
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k NetworkService
                                    3⤵
                                      PID:236
                                    • C:\Windows\system32\taskhost.exe
                                      "taskhost.exe"
                                      3⤵
                                        PID:1048
                                      • C:\Windows\System32\spoolsv.exe
                                        C:\Windows\System32\spoolsv.exe
                                        3⤵
                                          PID:1076
                                        • C:\Windows\system32\svchost.exe
                                          C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
                                          3⤵
                                            PID:1156
                                          • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
                                            "C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"
                                            3⤵
                                              PID:2044
                                            • C:\Windows\system32\svchost.exe
                                              C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
                                              3⤵
                                                PID:1772
                                              • C:\Windows\system32\sppsvc.exe
                                                C:\Windows\system32\sppsvc.exe
                                                3⤵
                                                  PID:3004
                                              • C:\Windows\system32\lsass.exe
                                                C:\Windows\system32\lsass.exe
                                                2⤵
                                                  PID:492
                                                • C:\Windows\system32\lsm.exe
                                                  C:\Windows\system32\lsm.exe
                                                  2⤵
                                                    PID:500
                                                • C:\Windows\system32\csrss.exe
                                                  %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
                                                  1⤵
                                                    PID:396
                                                  • C:\Windows\system32\winlogon.exe
                                                    winlogon.exe
                                                    1⤵
                                                      PID:432
                                                    • C:\Windows\Explorer.EXE
                                                      C:\Windows\Explorer.EXE
                                                      1⤵
                                                        PID:1124
                                                        • C:\Windows\system32\rundll32.exe
                                                          rundll32.exe C:\Users\Admin\AppData\Local\Temp\1857c1dd7942a15d31b1d9b8eaa72749f296221402aa659bab6a1b48e37f4122N.dll,#1
                                                          2⤵
                                                          • Suspicious use of WriteProcessMemory
                                                          PID:1780
                                                          • C:\Windows\SysWOW64\rundll32.exe
                                                            rundll32.exe C:\Users\Admin\AppData\Local\Temp\1857c1dd7942a15d31b1d9b8eaa72749f296221402aa659bab6a1b48e37f4122N.dll,#1
                                                            3⤵
                                                            • Loads dropped DLL
                                                            • Drops file in System32 directory
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious use of WriteProcessMemory
                                                            PID:2860
                                                            • C:\Windows\SysWOW64\rundll32mgr.exe
                                                              C:\Windows\SysWOW64\rundll32mgr.exe
                                                              4⤵
                                                              • Executes dropped EXE
                                                              • Loads dropped DLL
                                                              • System Location Discovery: System Language Discovery
                                                              • Suspicious use of WriteProcessMemory
                                                              PID:2408
                                                              • C:\Program Files (x86)\Microsoft\WaterMark.exe
                                                                "C:\Program Files (x86)\Microsoft\WaterMark.exe"
                                                                5⤵
                                                                • Executes dropped EXE
                                                                • System Location Discovery: System Language Discovery
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                • Suspicious use of WriteProcessMemory
                                                                PID:2728
                                                                • C:\Windows\SysWOW64\svchost.exe
                                                                  C:\Windows\system32\svchost.exe
                                                                  6⤵
                                                                  • Modifies WinLogon for persistence
                                                                  • Drops file in System32 directory
                                                                  • Drops file in Program Files directory
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:796
                                                                • C:\Windows\SysWOW64\svchost.exe
                                                                  C:\Windows\system32\svchost.exe
                                                                  6⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  • Suspicious use of WriteProcessMemory
                                                                  PID:2132

                                                      Network

                                                      • flag-us
                                                        DNS
                                                        google.com
                                                        svchost.exe
                                                        Remote address:
                                                        8.8.8.8:53
                                                        Request
                                                        google.com
                                                        IN A
                                                        Response
                                                        google.com
                                                        IN A
                                                        142.250.180.14
                                                      • flag-us
                                                        DNS
                                                        rterybrstutnrsbberve.com
                                                        svchost.exe
                                                        Remote address:
                                                        8.8.8.8:53
                                                        Request
                                                        rterybrstutnrsbberve.com
                                                        IN A
                                                        Response
                                                        rterybrstutnrsbberve.com
                                                        IN A
                                                        34.253.216.9
                                                      • flag-us
                                                        DNS
                                                        erwbtkidthetcwerc.com
                                                        svchost.exe
                                                        Remote address:
                                                        8.8.8.8:53
                                                        Request
                                                        erwbtkidthetcwerc.com
                                                        IN A
                                                        Response
                                                        erwbtkidthetcwerc.com
                                                        IN A
                                                        34.253.216.9
                                                      • flag-us
                                                        DNS
                                                        rvbwtbeitwjeitv.com
                                                        svchost.exe
                                                        Remote address:
                                                        8.8.8.8:53
                                                        Request
                                                        rvbwtbeitwjeitv.com
                                                        IN A
                                                        Response
                                                        rvbwtbeitwjeitv.com
                                                        IN A
                                                        204.95.99.221
                                                      • 91.220.62.30:443
                                                        svchost.exe
                                                        152 B
                                                        3
                                                      • 142.250.180.14:80
                                                        google.com
                                                        svchost.exe
                                                        98 B
                                                        52 B
                                                        2
                                                        1
                                                      • 91.220.62.30:443
                                                        svchost.exe
                                                        152 B
                                                        3
                                                      • 34.253.216.9:443
                                                        rterybrstutnrsbberve.com
                                                        https
                                                        svchost.exe
                                                        282 B
                                                        296 B
                                                        6
                                                        7
                                                      • 34.253.216.9:443
                                                        rterybrstutnrsbberve.com
                                                        https
                                                        svchost.exe
                                                        268 B
                                                        216 B
                                                        4
                                                        5
                                                      • 34.253.216.9:443
                                                        erwbtkidthetcwerc.com
                                                        https
                                                        svchost.exe
                                                        190 B
                                                        216 B
                                                        4
                                                        5
                                                      • 34.253.216.9:443
                                                        erwbtkidthetcwerc.com
                                                        https
                                                        svchost.exe
                                                        268 B
                                                        216 B
                                                        4
                                                        5
                                                      • 204.95.99.221:443
                                                        rvbwtbeitwjeitv.com
                                                        https
                                                        svchost.exe
                                                        558 B
                                                        132 B
                                                        12
                                                        3
                                                      • 204.95.99.221:443
                                                        rvbwtbeitwjeitv.com
                                                        https
                                                        svchost.exe
                                                        1.3kB
                                                        132 B
                                                        14
                                                        3
                                                      • 142.250.180.14:80
                                                        google.com
                                                        svchost.exe
                                                        98 B
                                                        52 B
                                                        2
                                                        1
                                                      • 8.8.8.8:53
                                                        google.com
                                                        dns
                                                        svchost.exe
                                                        56 B
                                                        72 B
                                                        1
                                                        1

                                                        DNS Request

                                                        google.com

                                                        DNS Response

                                                        142.250.180.14

                                                      • 8.8.8.8:53
                                                        rterybrstutnrsbberve.com
                                                        dns
                                                        svchost.exe
                                                        70 B
                                                        86 B
                                                        1
                                                        1

                                                        DNS Request

                                                        rterybrstutnrsbberve.com

                                                        DNS Response

                                                        34.253.216.9

                                                      • 8.8.8.8:53
                                                        erwbtkidthetcwerc.com
                                                        dns
                                                        svchost.exe
                                                        67 B
                                                        83 B
                                                        1
                                                        1

                                                        DNS Request

                                                        erwbtkidthetcwerc.com

                                                        DNS Response

                                                        34.253.216.9

                                                      • 8.8.8.8:53
                                                        rvbwtbeitwjeitv.com
                                                        dns
                                                        svchost.exe
                                                        65 B
                                                        81 B
                                                        1
                                                        1

                                                        DNS Request

                                                        rvbwtbeitwjeitv.com

                                                        DNS Response

                                                        204.95.99.221

                                                      MITRE ATT&CK Enterprise v15

                                                      Replay Monitor

                                                      Loading Replay Monitor...

                                                      Downloads

                                                      • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html

                                                        Filesize

                                                        144KB

                                                        MD5

                                                        dfba937dbd7054751bfa6d21cde4b4e7

                                                        SHA1

                                                        de21e00aabfe02525132f24c5bce5d38422f7337

                                                        SHA256

                                                        cb6307ea7e37d1be176e02c6680eb286886647626ace3614a6aa5be36f0f8e22

                                                        SHA512

                                                        02dc5d22f10085431e9d688404ac5e2e29857f01b0060b5d842db0d7cf18fb2374d19ca1f52c16922067e2b62bca0bcfc0b27b1628c82c84723fcf8cdf07dbe0

                                                      • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html

                                                        Filesize

                                                        140KB

                                                        MD5

                                                        0c469bcbf1c31ca5405d2ca0f2ea29bf

                                                        SHA1

                                                        5ca3b31cfec5785d74c0ae02d7447edc9e5e0887

                                                        SHA256

                                                        d44531487992a38745ba75ab7f825b6e1e2a995983cfdd31ff81355dccede5f8

                                                        SHA512

                                                        dd39f80c5e634cfe7509aa766f28315e26431fa186d42077d4791db44ff9f4b4a382f22a2421ea3b195f53fa36930bea65020d19dd6e49524cb804711a9935f8

                                                      • \Windows\SysWOW64\rundll32mgr.exe

                                                        Filesize

                                                        65KB

                                                        MD5

                                                        a9ea94ee4a3bb43d4057823b2072dc54

                                                        SHA1

                                                        94ade3c34ec08613daba8a1240586c24f8169794

                                                        SHA256

                                                        7edbb67a880d90e53ec7949c4907f4ccf5596899b98ed8651b01a485a7b06789

                                                        SHA512

                                                        0ae24a452c474a0b67eb17ceb78eabc46aad7f04a249d526cbd1bf25ccc94016133ee6cdd1cf342fa3c8dbff60372d18df56137a6c0303bbaee07f005f930ab5

                                                      • memory/796-28-0x0000000020010000-0x0000000020022000-memory.dmp

                                                        Filesize

                                                        72KB

                                                      • memory/796-342-0x0000000020010000-0x0000000020022000-memory.dmp

                                                        Filesize

                                                        72KB

                                                      • memory/796-36-0x0000000020010000-0x0000000020022000-memory.dmp

                                                        Filesize

                                                        72KB

                                                      • memory/796-41-0x0000000020010000-0x0000000020022000-memory.dmp

                                                        Filesize

                                                        72KB

                                                      • memory/796-47-0x0000000000090000-0x0000000000091000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/796-48-0x0000000020010000-0x0000000020022000-memory.dmp

                                                        Filesize

                                                        72KB

                                                      • memory/796-35-0x0000000000080000-0x0000000000081000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/796-34-0x00000000000A0000-0x00000000000A1000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/796-30-0x0000000000080000-0x0000000000081000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/2132-72-0x0000000000230000-0x0000000000231000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/2132-67-0x0000000020010000-0x000000002001B000-memory.dmp

                                                        Filesize

                                                        44KB

                                                      • memory/2132-69-0x0000000000220000-0x0000000000221000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/2132-71-0x0000000020010000-0x000000002001B000-memory.dmp

                                                        Filesize

                                                        44KB

                                                      • memory/2132-73-0x0000000020010000-0x000000002001B000-memory.dmp

                                                        Filesize

                                                        44KB

                                                      • memory/2132-74-0x0000000077CB0000-0x0000000077CB1000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/2132-70-0x0000000020010000-0x000000002001B000-memory.dmp

                                                        Filesize

                                                        44KB

                                                      • memory/2132-55-0x0000000020010000-0x000000002001B000-memory.dmp

                                                        Filesize

                                                        44KB

                                                      • memory/2132-63-0x0000000020010000-0x000000002001B000-memory.dmp

                                                        Filesize

                                                        44KB

                                                      • memory/2408-14-0x0000000000400000-0x0000000000421000-memory.dmp

                                                        Filesize

                                                        132KB

                                                      • memory/2728-52-0x0000000000330000-0x0000000000331000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/2728-24-0x0000000000400000-0x0000000000421000-memory.dmp

                                                        Filesize

                                                        132KB

                                                      • memory/2728-62-0x0000000000400000-0x0000000000421000-memory.dmp

                                                        Filesize

                                                        132KB

                                                      • memory/2728-61-0x0000000000400000-0x0000000000421000-memory.dmp

                                                        Filesize

                                                        132KB

                                                      • memory/2728-27-0x0000000020010000-0x0000000020022000-memory.dmp

                                                        Filesize

                                                        72KB

                                                      • memory/2728-607-0x0000000000400000-0x0000000000421000-memory.dmp

                                                        Filesize

                                                        132KB

                                                      • memory/2728-53-0x0000000077CAF000-0x0000000077CB0000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/2728-68-0x0000000000400000-0x0000000000421000-memory.dmp

                                                        Filesize

                                                        132KB

                                                      • memory/2728-25-0x0000000000320000-0x0000000000321000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/2728-26-0x0000000000400000-0x0000000000421000-memory.dmp

                                                        Filesize

                                                        132KB

                                                      • memory/2728-603-0x0000000077CAF000-0x0000000077CB0000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/2860-0-0x0000000010000000-0x0000000010082000-memory.dmp

                                                        Filesize

                                                        520KB

                                                      • memory/2860-6-0x0000000010000000-0x0000000010082000-memory.dmp

                                                        Filesize

                                                        520KB

                                                      • memory/2860-1-0x0000000010000000-0x0000000010082000-memory.dmp

                                                        Filesize

                                                        520KB

                                                      • memory/2860-3-0x0000000010000000-0x0000000010082000-memory.dmp

                                                        Filesize

                                                        520KB

                                                      We care about your privacy.

                                                      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.