Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    133s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    11/12/2024, 10:32

General

  • Target

    e10c27f92c7a049b3dd25b2fa8c2864d_JaffaCakes118.html

  • Size

    155KB

  • MD5

    e10c27f92c7a049b3dd25b2fa8c2864d

  • SHA1

    ad5e0aad864b816bc6b2451533cd1a1b91ddd76f

  • SHA256

    ca7fc78342dbe0f0e6f760debb1a72659b7f8f74be65e7c50b59b3bd4e962200

  • SHA512

    765078f1389fbf501d56a91c6986d562d1e6f53ac1721677bd4d734fc711249ef19e12216dbe9043c6786b52573ae79f65bc5d1586261862ae45c29991cf3f58

  • SSDEEP

    1536:iIRTje0q1V3zPaGyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJA:iC4xzPaGyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e10c27f92c7a049b3dd25b2fa8c2864d_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1156
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1156 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1912
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1328
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:764
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2452
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1156 CREDAT:799759 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        PID:2244

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1c0d66022541e13f48df63b204b3d365

      SHA1

      30089fb328dc813b26cc8ea481fda8f807d0dcd4

      SHA256

      2d106d24fe298a4a36c88fc23c7a32df7ededcb2643a284b97ab2ee392a67243

      SHA512

      b88438b2d1bf7e2bbf65cd3ede5fb6b2074a38db5eadfee95a2fca7f986721d2ae287cda6165f8f2065555d45d5f4704265aa486d648f8e6844e5c1455d1c14d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8fa386040929e8c24319f316fb5d193d

      SHA1

      d658963c289db596c3cd43d32162373f44eabfaa

      SHA256

      ddafa4a79ee8c972de408e84975d42f19d1b94101c2afe4f82a8f3f89f285aa4

      SHA512

      1cf3ab61e58c2ef8b56da69f5b021d326ece51aba63bd7f4f385a931c5d38673886111e1e13db96fcce3d4eaca318c8c5a76f4092aa38dff14586fd8779aa84c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      fcd2883f9a4ebf8c78d26b59d99e6681

      SHA1

      27340d412ad77d6056cb498e2b259ba82ee79445

      SHA256

      6fc7c7c10d9c00c7c179fbde6dfcc7237801c7265ccb53bae98ca9f242b3c443

      SHA512

      464ff7cfbf33040c45f21c2d8f59e23a40902f94f0f57cd1f97efd76c96efe523f2d095a519e7f349061ec7288407123c19eac493c1cc5da7c82dc6294af8347

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d94c7bcc637c877425b4d39dd47d33b9

      SHA1

      5d2fca3f60929f932532c1cf3ac08e00c5d29255

      SHA256

      1ba126dc90b8a81367aae5d6a61ddc418880ba953a8452883f5bed624aeae4bd

      SHA512

      a6a3fd0d93b06208501cb0625ec372034f3fd32d6f7647474895bb8d287ed3e9fe5f0f45e80a084f45c3bebb8f21862862e0a17fb9351fc99373134c00eff44a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      57dedfdd8569569bd8b8056dd25e87d6

      SHA1

      e7b2b50c8e3f17b363b36a51b4af6a529f52749d

      SHA256

      023a2d0bb23cbb20bd2d0e7826b212b2c316c44b9d964f724c5e5eb97f822a44

      SHA512

      0aee267762c21b13244d731cf7e85507d21f9951d3f7d3a94895c3cc036882e3e1f0da1bd8e589a1c1a1986537b62f737c98b9e9f0f524cbe97bdf523e60465b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      268eb7bdd519ed480c0f260f5c9853af

      SHA1

      e65a0ffd756c54d52ec2a25c86e556b1e6433ce7

      SHA256

      54bb7541a64ac065841bcbbaa7ae0e62617a9f71407aac92b80e9e9eabb8e897

      SHA512

      5a24f957c59fe9e88bb1be538ccbb7a2dee9b9a93e6d327abae315d4ec42c9ac8d52eaebfccbeefbf1149c0acfeae834544cfae6992c61bdc5670ac64ee5585d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1166b17d35592ba26601f22e4e8654bc

      SHA1

      1d24d5604576ddf8c0966b97005db5f0f2e5d49d

      SHA256

      cc2333065c197543b951a44e286d5097a268711c8fb321fe892093b488f2f481

      SHA512

      4f1a897ddd429a6afe911ac9272d249a3ab45c69d65d568ddc299aa5e0351f900250795f66b55759f1652f2ecbdf22e61f97fa09e7ceadc20f9a0063e7280d38

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      55e425ccf05d77e2f9e463eea6a97b06

      SHA1

      3a2940785e77bfbaf8baad57fc08b3dfb2646a96

      SHA256

      daf4522db9e3ccbdda6115ddff31f7e6f5ef630b7ad041de1812e662a43ca844

      SHA512

      acbc8588d1c4acb2c1b9eeafb34952119d0e4067e5e707e3848a33ad82d80000854cee3f03ef1f273bf2828b7833b18a1c5b4ee0428aab814628828f63de769d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3d1bf9d0d748f226e19341189cee7d0c

      SHA1

      414f3a9aca32c192040916cc8072c4f70ab988d5

      SHA256

      d91e898ae0b90b5679e11a43b9be8e8af59cb5824951381b6131c1854d2d2360

      SHA512

      55af2f7c9590affc7b6cb7f2f2fb71128464509ee7b5a82c3f97d0b59875d79a992506fd2cabcd0423fc1ceff55cfb83014dd71ae487b0662ef023787928c19c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ef5e474d2585abd6e1a965d1df8039c4

      SHA1

      311d97dfec2c3facedfba93b621867e754bb1aca

      SHA256

      7d61650ec6d95886078105ae1887f2e4ec45f8f4072fce53b2c1de6c684185ad

      SHA512

      4e401fe5711504c744971fd1a67c86cb82eaace6f6ec4aead6c93674b40947e1086864765bd00abef743aafc91cba98ae3ae03fa44edf711853fdd557fff9824

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      75ceee7a78b77a90a2e13f69de1e1638

      SHA1

      aa80aca4b79bd7b4bc8770332da24bd6ffc9f581

      SHA256

      e1694aaadaf409d1c354f564930d9423037755c32b92022cb8366cb5e8002b1c

      SHA512

      8f6190b5001d8a2482e8b8a7d7fa5a56cc86980bfd80b303e82dfc49ea203b589f8197b573edbbb199bc191f50bc3fe494fea7d88e3ebbb63f77ac6b93b4ac5a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b5b281ed24df6aa2acf9fe46ed28cbdb

      SHA1

      8f51e744926f41e2c80388906a6a0d77f9bffddd

      SHA256

      40d489f0921a6c9a9e0ab8689777cf06c4efdbc3416a8e872b30d259bed92bde

      SHA512

      3683bfcf86b6a74fe11327032b5792590d76b7bae413f75b9e9b093dc9007e103f2dd3b3252c9b5cabccb439d1f2eb48296ab1009a0c77ba8e3fd5b8d839bd5c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      16a8792de5513e890e7ce1e59dc06e1d

      SHA1

      a669be5198d0dec7b21cc89a2822ab4f93b9a77c

      SHA256

      1fd61e538d8c7f5c9ae00394bebcb387704dc9c8dcbd644a5e7fbfd800d43ede

      SHA512

      2efc19555113715763eb49b1cf60135c02fb5df9bf8ad73c49641f13c2dfcb3cc1219b96a75c0bd8f52950f50937b8c11d81e3552cc88394b4ba06af850f2ddf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f0473df5abf316c84ee8e042512aa26c

      SHA1

      e95ce25c38fa5528c350871e5db5416cfda9c3d0

      SHA256

      f7f03b13317e091aec7f4f2543f478a7581f3c485f714a835b0f6bb2b0ed9d19

      SHA512

      606ecde37210fc0c7ae4e2addb2acecc9255d71f2d44e2871eee4c4faa0d3aaee60e82f99d618e9c299c37c0b934b75380349c2c6bee8eef8008b807a5eaab4a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      63db467507fbefad936f31b25377d08f

      SHA1

      7d04341ae0adfaf0c401cad27b48fa4c6e8a827e

      SHA256

      ee2c8452c4117e1ae3f2993f623b737d4096473ecb4532050241f07f4f6f520d

      SHA512

      784939f539c29bab898827e9567c1d2a0e88230e54306984f84188dbd7a161088f861410e9267f47d69dee898993f51711c662ec96cba198a8117cd218ae54d5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0ca9df34a35ef87c874cd06478d3089e

      SHA1

      564153f87ae43e3b36384db0fda00383f2977e3b

      SHA256

      569457849a032dba3bbaa8acfcc609998e07c51bde09e1960cec3bf6680e1af8

      SHA512

      854d39df8de8ae8e4485ac27a01609d7bb6366b1f722c678e72a965d5fa9b1bbaabfb14a0ff53f2c9989dcc1001c53b4fe91e7a72aced3a4b21bbbfd07fe655e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5264b9bf379cef00895453e49276c04b

      SHA1

      4e8b0b5c84c872e370151d1fc44fae202b40b79e

      SHA256

      128ef6d8f1e818872690295d2c99459087728684843d29b7e51a134833a6e4f7

      SHA512

      0d382a0119cc72d78e9f794a24e6e278ae2e441889746453113e9d84499d9feacbdacee0914860fbdc2a2b84c5042c7ccce75c3332c878dfdac8fe2a4daf164a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2685ed1bcfce70b868f7924a25019637

      SHA1

      2ebb5cdbef1a153a1dbf988bf18686d00d6e8310

      SHA256

      594e8b999a1d30c198bec69aa3409e75f81d10ee419346a0271451aac6b55473

      SHA512

      257f838722e16888304d4b7dbcbecbbd5139cdaac089c82da79c5f1a0c899d9b9cad549c10a4e5fd567abe461a5668c2e6eccba8d5bef62e378772a35a0ba872

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c70e6041360a1ae6f7b1ae997850b60b

      SHA1

      068b2ddbba2b5c6106a9487c0276f0848559802c

      SHA256

      bf549dcdcc7fd4c1f83a87c28ad7c731fcf0abdb6a85b2086f1e65504dc078c6

      SHA512

      68272f1e021f1d38ad8496bd15fe6ad4b411a5636ff58059b07e5f652709cdcdf833d74fa5d8d8e1ae7f630a500db52b1e0f2b82a3bf2a030c7d753cf3907326

    • C:\Users\Admin\AppData\Local\Temp\CabA70B.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarA7AA.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/764-449-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/764-450-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/764-448-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/764-447-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1328-441-0x0000000000240000-0x000000000026E000-memory.dmp

      Filesize

      184KB

    • memory/1328-444-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1328-435-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB

    • memory/1328-437-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1328-434-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB