Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    130s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11/12/2024, 10:56

General

  • Target

    e123548222b472d59cfa9b374301a788_JaffaCakes118.html

  • Size

    158KB

  • MD5

    e123548222b472d59cfa9b374301a788

  • SHA1

    bdcca2dc0492bbf8fd132c2424294c715638b7e6

  • SHA256

    bd1f42040982bd2f7453e03d4614d7fe6ff281caa5814ec4ffd694be86a1aef1

  • SHA512

    cf61534be4306bcd91ddf94f3f0ec46506b028992b5dba62b78931b27a25e471be24c24538ede9f8bc0bb93a2a6a9afc24dfe40385ddfe3cf332d33bb6dacdda

  • SSDEEP

    1536:iTRTcPtStl4ZVvyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrk:i9GVvyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e123548222b472d59cfa9b374301a788_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1704
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1396
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2492
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1428
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:603146 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2104

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      aaaea3b6775736159963238146b3f0f4

      SHA1

      6699b1251dcfc36ea0461a453bd775187ab4c542

      SHA256

      3d0b70705838a37d92a47264b89aa229d66ed32511ff45284694aa1565d253ef

      SHA512

      1145dc73ab2bfbf7806cedc2dc33b42e9c8b4caf596aae77841c01d9c0134ff30c17cce77d30d1685890be1f8a70391061d2831469f6570098ff964a36d6c0eb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      fdd24c35b2228f4f5e9c1b67488dd767

      SHA1

      5f4551a55c0c19dd602b96f837a79f248d009fe8

      SHA256

      a489c2523a98f64b875b101a18a3592ec12d16b6f0290e3860f174e8dd57c175

      SHA512

      c3977dafde8531fd77191d3003fb8592c665f217071a3be8266744b5873b11229714c4aa62909eff51a528320cba8917777bc67ab353441ba5e7107a92fb1c08

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0817878a036d6b3b2d28d264d6cf5d2d

      SHA1

      9cd9125e1fac5722534d384450117c5219357600

      SHA256

      41b9eb78fbd46b810581725d191bfd26d21acf1e467021c08dbf70a6ea075cbd

      SHA512

      e662bdbeb9e45b4919b8e0c83a20eee08402c8a4384cda3709e1e7781bc6c2edb58748c04a5f74acfdf787fa5cbe6a092846206b8ee851883b02371cf1a70486

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      fd73747c9d3802a476d77ab8b894e2c9

      SHA1

      48f95f9e061d69823fe4ad69727f32935ebf9170

      SHA256

      c44a91c2dc93bce9cf1a6533fb474fc3d7225e85ec5e2db76563b42c25ab6eb3

      SHA512

      c6f7dea126e3bec3dc109dbbca452abd932fea0630aca831ef3470b862cd9de97b8c348590824b614acd6b41a32baffb40b1aef1813b95649c823743980bb77d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      42a92e25f3c28de1f22b8e63a3bd1caa

      SHA1

      d627f9d245d7e901b1fa833f197d94228da74497

      SHA256

      d942c5a25e855734e2651a1b222253f0898b66211408d380e2d3a15d0203509d

      SHA512

      328f5af5b041e58bc3406ddd4b3a565f29bd4de53fb8bf8e19ddccba683180ebaaf752ac479d3a560877107c50b2ce067e3bbe5aab683ee7cf22738091d4f440

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      736de57b4239b9acb6411c54c8658ea3

      SHA1

      cad40577d662b420a671101f9941888f91c1939e

      SHA256

      f10b1bac858882362808b1dc3b21caf845f67673fb8f6100d13f832cc7cda4fa

      SHA512

      0a1430c9450b64559b5558ec65f756f6192b8db7809153524e545bb3e632e19389501b1fde67a6f871df352b52d061e890a9c325996640b4903efe6126a84f3e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a9d861b431eed7b3977c4de3f9c82f2d

      SHA1

      147e3e75d62a27258712ac44ec352316124ecf4b

      SHA256

      0b2db28d5a7fa82247649160428d634409792ff58039a48efe478a4b1e44f835

      SHA512

      3f4bf3d41cb510f95e9478439da6db13b742ca561d60d11973b6c9744f34deb8dbf68301b4f7421ec490a150175ae48231a63e3c3c51940366a6615baed2376b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c3c09f4fe059cb0dfd1fef2c66233089

      SHA1

      3a483b8c4056590125a4b105a7d182cea03508a6

      SHA256

      0b10408bacade3ea31e32cda3a3f6c9049540a081deac6a85e5d3a44298b0514

      SHA512

      11afe47aa2f2207bb6663bf6ec55d61da0aa78f3209d409e0efa8a76b304edc80d1921b0bb6e5bbaca3c8bc8befc1840cc49ea1ff06f7f3586a0b259d5e3d33d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ea5d4c3c3e1ddae16ba8dd3e3f29b6b7

      SHA1

      47fd3e7ded8a45a5fdc4842664d907cd7c280694

      SHA256

      7413c145d8e0a6583125a5f06b655b776c92805b65ce19887960804e2e6cb85d

      SHA512

      6a61147f97d7f29116b820d79a265d6361690ece12ad69ec8f7028096031e9ea9294aad89b2292e96f25611f4d5eb18b2bf7442e132f6741a3e6dc0cf55ea609

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9396c43739eb7550d3eb7062d34c3e64

      SHA1

      b1a7fee1e375aadc175bfe2238ba95377676cd27

      SHA256

      c32654be18588fe2d498e3fd220c18042792ad05e8f3db41eb1b3ae951219976

      SHA512

      8ea58f2c45e7588a3246f1d932fed191081193bd11a4e68c3b7026781a0f890bac18043215bb003b73cae5c89cb0dfc0d3be0e0335c3294168c0f18c76b2e101

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1b138a90c0586797379b3e2588204e35

      SHA1

      cb849b4c5a2208840965124b1c0eed45c2021795

      SHA256

      fa5298d4de9297e4d8f1ed257c34a16687065a5986bf412f7977b90dd348b2b6

      SHA512

      b3591fee3eb63e2d82cbd6c4f78701262d26dcdc448dc8a3fe49588dd56d6f29abebf8116b23d371ff6a9f779eb3f012088ff4dfc07b837661d7606e79f3e731

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2fd7c4bac5c85647f70febe47e7532df

      SHA1

      81f2f741458df57d3a3a481f9f04c20217f83f27

      SHA256

      77d96bd34e6b5a8c259ef97101614b9c3354089c86b2bb5ab4a5ef8ea7cce77e

      SHA512

      b4886c956e42f982f0f7e996cc63b557a32745cbc8dde597ae78998f069306d90a88e196b3438c8b479ddea66ae447d1a993f23ea1ef199108d1cce155a87701

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e6b857fefa34f116cd83279231f59c38

      SHA1

      2825d0897062078d0e925b14756766338d3f5317

      SHA256

      aa67a0d6c2059c8a7809a78ac453ac71b37d1f29cec9e8dfb30d58589e528ddf

      SHA512

      74d5f58743e1fd89ffb4f8b54e675001830e05712159cf47e8bac78aec9cd109d497e9d412a977399acc47546fc3cc7c2f8a28357042fbdf06849fd5b9059024

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1414a7f50adf1f65706afb890ebf0641

      SHA1

      fad505b0d41ad485876478bf491388d3d4e9ceab

      SHA256

      bd9cba3c35b45447e2a33a85edf5a134805566240d2071a45ccb8d66043dac33

      SHA512

      d0be62de71a58663b8a418152beab5f6531c103376bc739910710c7c145a8ad7d445f369e5f8c6128be845411dfacbf650aad368f6696c4fa4ec041a0a697513

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      827861efa5f04a6f341f025332006dbf

      SHA1

      728bd858dc88f2eca682318cb2b61245a19c4e8a

      SHA256

      a75a992d695ca17a7d3d4333f2a2d642586289bc0eefe11c81542d570eab4344

      SHA512

      f6db73674893e2fb08c7b4ba0f16e35c130eed4d8d989aad75e325fadc9c842237d6b80311e1346891c5cb70e8843a974ee7658b0f7c0d7b862b92d57818146a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3725f522c259a1ce7e29f590999ee0fb

      SHA1

      bf123b89a8ee9f46fc01bfee24ed6605002c916f

      SHA256

      405970a11f8752c431ebe6af0b87fb79fa359a097f841faafa76e45ffe188b21

      SHA512

      d3f8d411545b4c9d2efd727afc2c181d747b7af484eaf53c119ee64fa16445988399136b8c3352a666d899579beb1c40969b3c39dca04af8a047280be5d8f4a5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      216973209e0c293df3dabf9cad0d839d

      SHA1

      3dfb42b760e2b64cd2a587c8c43cdd45125670c7

      SHA256

      4b98c9793ece320721035364718e3a29f65b9b9dd7b5a0f8643e6485e6e45bac

      SHA512

      683f9970de7030af46a53af1a915e8cadb3afba66ea4d2737760c82d4f36a74a70e34ec71afb2b9018e7486823263b41dbb067e3023eb66f74f9bff0db265b89

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      89083e8de58aefa9cc1e41c7e60ead68

      SHA1

      ea17fec85b927ff8c5c0b0ffcdc9ecfe4ee7a74e

      SHA256

      23ecaef8491232f5200123d397da184a3490f11f5a6bfd3a2096241104c80cf3

      SHA512

      49091af91b9f68e98d1c37dd7231b8a16499aead21f0fbbafbf89a7ab0a1754331c5ae71d5686b34cf58e3f4966bab08225a250f8196c14064aee695290cca12

    • C:\Users\Admin\AppData\Local\Temp\CabB2BE.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarB36C.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1396-436-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1396-437-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB

    • memory/2492-447-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/2492-444-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2492-446-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2492-443-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB