Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    133s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11/12/2024, 05:33

General

  • Target

    e014a0342aa03af5981f00d49c371e3a_JaffaCakes118.html

  • Size

    157KB

  • MD5

    e014a0342aa03af5981f00d49c371e3a

  • SHA1

    427098c6dc4b3ed0e3a2e85ef18e31d948c04f10

  • SHA256

    6cbdfc0fb03cdf4f84e7398804720feeef3655fc1407b954732810eca0fea908

  • SHA512

    767bec8a8e1434103d23c99889be68fa789a8a9c1105624fb302e6a5384d09e2f77ad123bb5d10361e1de562a11a4be6545f449aa13e93b740c0d09b000f6403

  • SSDEEP

    1536:ilRTEUuIMbxXCyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJruH:iTEFtCyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e014a0342aa03af5981f00d49c371e3a_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2000 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2520
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2468
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2388
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1500
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2000 CREDAT:209943 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1644

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7d43cf8325eb6f0b158ac9d309a3f7fc

      SHA1

      2df72b3fd333dc479b44597c53c245baa048c5d2

      SHA256

      7a071d014cb0b0c85cdaf67ac856e9ad93f1365fafec1f86e103ac817eb107f3

      SHA512

      13db5c5b378b2773dec66beaa1c9ee09eb523f77c8505ebdf1545c2a4e39407cd56f8ccf161ede026298c7d2d197b3b9f5cea6e26197f8fe9ee6bea229d98eb0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d3c80966e66a46719642788f840c30b7

      SHA1

      5ef5744f7d74867c8ffa4d979b2682d4724c6efa

      SHA256

      aec699d98ceef356be6bcb7fbc0f853b2e5f239abe8fc846918e381d04bedb13

      SHA512

      d2c74c876042b9fafd41cb91ae7a315f67f08a3c89cf553be6a5dccaba43a1549331083d4f731d090ac707780ec6334748eaf6dcd8971cea9c592650051474cf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6f79fbc484e201ba5a81584658edc366

      SHA1

      405281de23c09a01d8572ad6f36fd7525c6f9c74

      SHA256

      2d78225c6b90181a6afc62c1d344866a6bf6dc03a28161a9a2795457ad114ad8

      SHA512

      6a652419572f3e3c9cc237923b74a44fde46d1704153cee9de5dd594914a0333e5f0f86c967472b2c7efcb04e618377344e5d9b219b3e514ab551fb03e301735

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      dafc6dc979adbfe93786e78e71e24c09

      SHA1

      9e2462b47d17155ebe839d76b3224d2d27030d40

      SHA256

      bc743968f4f8b650ef343372cbaeabb5679f3fe41fa013d8edd3fb004673026f

      SHA512

      191c5a367d9ca17921db27505690d1553bc9a5c4433472df4b71e8ad7f1c1ee4e4d0d94e8fafe78fde59399b35ed10b7be4a4cc9bafc7c28189630e7e310b28b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4273fe52f76372285190c5b0abe79d22

      SHA1

      babd49d4bbd326fef1ea914e28b5dde489d242b9

      SHA256

      5daeabb005e8fc95e27a6fcc37e46d05fb24e7464d476d89efc012b78760f661

      SHA512

      14ab1e9588bd72c56ab820d436ac21d5b28fe155a3b734d978f4ed3d05a9b1ff5433c98da23d5c9822b6bdf4ad72d21a42544ae519913c7f80c48edeeb042989

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5b00f222e4fccdb474c0eb734379b3dd

      SHA1

      90720b3030213663907678fe8d0ed4c05926f084

      SHA256

      c635ead8cb4bc0e58a271594838178b0f403029ad5426a36885f73508bf2697c

      SHA512

      359050f28428cc7634ecc95bcc3747363c07e03b388ae0c8e6676c267cfe60332696877d7d94c24927fc115959bdeabc451df213d3bf0a72c016ed717b6ed95d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9b9e49f0eda324f630e7663f697af725

      SHA1

      23273d86a18459e7754bc0b95949db326ed7180a

      SHA256

      57eb96988780d2e837de976b52cbf386eaed5861361bf61d4ca3d3fef8966285

      SHA512

      f7cd95315efe0ef4417f400d9d2280e151f57a23ecc1873bd95d92e391ea5c7d49a3b91bbbde837d0eb0744bb88b2b37c0c5aab0933386b645bfa6fd7b2bd6e1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d5324abd414a4a2dbde8714eea59098a

      SHA1

      8e0b60de4837fc7cd82a2e623e3227f65b258ca2

      SHA256

      9bb79fec826f6c7340b58a666b3b0853ac73a3cfe9ccf606f48e04d551227e52

      SHA512

      b161cea2a871ec6b8a3bf646a4ffaf598dc69265a5a496c2fe53d1685439ad20e953dff19dab23035a4e5f4a7106387ef55b8c0bda8e747879bcc07d3fb600c5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      dea20c42dd344cea8e6a2c38c0533be2

      SHA1

      04cac434491ecd99382ce60351c175dc3dbc3d52

      SHA256

      5ba021bda34682e11111d19681439190f6ec8c8e8b58dc0f143933f651be9a5f

      SHA512

      272624a775775b0b6ed98f42e7114342830f9db8ca635d73ae7aababb7fe446b77079b6708f6b8059db984980e1556939374d97359783539934f414ee399ad87

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      53709f7c910c2c9d9bc5aa11f820af8e

      SHA1

      c93a8496e2e9ff77559a4dd061434aeca211a371

      SHA256

      0de13e744fd2e1205f6e4936ee1371afd2b8aa216cec59601db2e7c7e2bf646f

      SHA512

      92407468772b6c487cb5f821ce8843e85de6685ac075bdda70b5106525a2e93eff5a65fe4800bfa35366a064a7cc86148b17ae7d96a7e0a11121e7e7872c7a2d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      435b0e14d6502ffa2c3732a9d8eace51

      SHA1

      b7098207a48505eaf6e9e038e42ecb8ab935b999

      SHA256

      4ef854cfe819c76bf171c65906ef354836ed2e2dd3b74ee302384f3de2cffaa4

      SHA512

      c1e1ee189ba38bf4e5351e5785a2cf8f5dcbd05e234a6553c99e20000d3c32b4892803b88aa0bd811c73d7e680c5b1eb58c1584eaa9bea66b906746debf4c72b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b608be7248a66d757dcecf73968d02be

      SHA1

      67c8303adb72d9cc95ed9ce43dff3bab2b9dbb17

      SHA256

      67b4cad8e9f8b106ce924b782ff8ab8e646a5ac7abb5ddc350fdd4ebdafe55e6

      SHA512

      d0e3f9eac2df7419aff26ae6ce8f342b0091969ecd71b6ee6acecdc2bd11507363883bda3c60f0e6d36195b5e00906c06dbfdb8b55b6552acd5cc2e9a0672998

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f0732c19834772f88022dff021e7f2c7

      SHA1

      f98bee19df2cf3e9f1427abc4ec072946f97a542

      SHA256

      a7021cde60fa06d05549e18bcc621aa8694b564bf1d486bfd587f4ce2ff4aa56

      SHA512

      8c445780727758c8718447cc84e7064c3a2071f2ee3e977c4a42edb2fa67e416497918d1283e5ae098836f2b6e442ce60423b76ec15d8208787b784b07d484c1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7b2b0200d0f04e6b9683136e687a2d92

      SHA1

      8493873c2a7c823a2f26d8a6e5813ad0ce5d1785

      SHA256

      b8ba566b1a42d9c706378c08f335f797d6f14a917376dd33f47c5378360dcf7b

      SHA512

      14cf196a2143e0c62d9565adf8ed8ccc980c6303b541b4eb3261d0b4e247942a93c31a5c2b8c51fd113e37670fb3ada6f8439ed883f406e24fd0abd784213ec6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3de80167b533ea460a30daac80a38bc2

      SHA1

      8c697ad4cadd66f4740670cbcda5d07c55e3083b

      SHA256

      fe5a9bc8fce28691126792cac4112b384ea7be52fd610c6d170804dc3e447691

      SHA512

      c2aa2240716230b3ab679485b9afcb95781255a3b157b0a509b257428c0726e23305a72ee0dba94f191a7b8f3bae914173b65f5b036b3d26f0f86f092fdf8ad9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      92afb300b8343c05ed19e1f468b4f999

      SHA1

      01528c20fe979375964b6461cb52d4262b4e5c48

      SHA256

      25fd5f91a44ed361e144019ff2cc5902cf9b56b19614a933499c353f64478e11

      SHA512

      eb5db0fcab7f7a9dab19809cdb24f8e70374e7bbb8fe69d84e878ceb9ce63c911e49ddf61b6158cf0d7b701374599867c65704f5bada8e29d0b93ae75a7ba21d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      29ad2b6c3c093f4089df948ab6d88197

      SHA1

      abecce6e753e00b41256edf1207713c2e312a74f

      SHA256

      0371ae3116a7a7e31bd3b72e92a23a6b61f555f49b782a65431f9a352e5c5830

      SHA512

      24de76f47737a191a8b72e09ea42e463cace087916154ff5750165e3c20a9a5041bd58992622c615e8438b941a15228f244a12435015473d449c41eb586218ff

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1e8cf82380a81c8510181846166bd303

      SHA1

      999da7c8689ed95bcd45addd5875f771eda49c82

      SHA256

      960431de263cde55225a1e8315505c35e707c87b53f8a899d9a65f3028b4b0ac

      SHA512

      9c6a96f854b8e56566e05eb811ed262240c259abe7865e197410ebd7bcc0d079156629b6ccff75d1b6924f5aba0b744d2df9caa91ae7370f9d6cb7049abd36d8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0f237263c9cb6610b179c7c33030ba2c

      SHA1

      89c9f92662c99bcaf1ce694da20e3273e149bfe2

      SHA256

      4119946627afcb1f60fd0101d822d1dce0728fbf60805552b945d4a3705b1839

      SHA512

      e709fd41fc4c649e2cd4c9028d81207431657fcfb90965835a119bbe918ad3750446098b6c8bfa7cea0bb13fdb037dcf140336630c04013c7c012419af5ee4a4

    • C:\Users\Admin\AppData\Local\Temp\CabB0F8.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarB1B8.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/2388-448-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2388-446-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/2468-436-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2468-443-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2468-434-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2468-435-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB