Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/12/2024, 16:33

General

  • Target

    7395e16192b4e5afc20c54da5494d4785f9c76f2810cbd67c5cf128b8da3f703N.exe

  • Size

    1.4MB

  • MD5

    142bb5493b521f174a35838b7192bfd0

  • SHA1

    dc3558d0e07d5b1c9d50e6feb07bf3a872a73f42

  • SHA256

    7395e16192b4e5afc20c54da5494d4785f9c76f2810cbd67c5cf128b8da3f703

  • SHA512

    9cb0f4dcea22b753b4821c7f3741727a993f68e0e38502096ec60168af29a333e0491ba1d2c23159c070cdc02e78b88f218dd7e14bb3993b2fcbadf1a84a141f

  • SSDEEP

    24576:EpU3n5+rG/LzOaLahrD8hcrHhjN/NnMTkKPZ6WSocKEs:8UXMuXOhrgh+HnoZ6WJct

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7395e16192b4e5afc20c54da5494d4785f9c76f2810cbd67c5cf128b8da3f703N.exe
    "C:\Users\Admin\AppData\Local\Temp\7395e16192b4e5afc20c54da5494d4785f9c76f2810cbd67c5cf128b8da3f703N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Users\Admin\AppData\Local\Temp\7395e16192b4e5afc20c54da5494d4785f9c76f2810cbd67c5cf128b8da3f703NSrv.exe
      C:\Users\Admin\AppData\Local\Temp\7395e16192b4e5afc20c54da5494d4785f9c76f2810cbd67c5cf128b8da3f703NSrv.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1940
      • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
        "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1796
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2060
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2060 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2728

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    484a509925a4fcc75c24591367908483

    SHA1

    e55cacf936a2688acfb4b624ff9e01186a61cdc7

    SHA256

    fab2b1539d20ade6f75f29d959d0216164221ba988f7c4bb7367c4b5a7bce8fc

    SHA512

    3ead3b497ad69ae7327a493a65949e03f17154220831f9f3eda12bbf4593e2d3aa9848a0d22f93e152dd87994b8864a289698ad54bfb542046770572c1ff17b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b7143fe3069c035cd4b1e9630f681f67

    SHA1

    60216ee67769b0f64239e526eff5cc3bf088cd96

    SHA256

    4f4f11fda05642a8a4e46119cf72e1b231485958af9a959b44ee2b01fae7d25d

    SHA512

    5adbcc3d8a8ef86154a30986cfce2cb7ca98df60e324f82a479dbc17917f9340ed9b7937b8b08b84b6a74b9270e8ab97152d0251ab548509052c42e279ac6e6e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    854a82b5ae535a706ca90a4bfafe2b3d

    SHA1

    b1be776c0a486a68608b18ff02669936e4a8b753

    SHA256

    808ca67933e643726415c2167d7cd197140d761a31e45a1bf0738b594b15174b

    SHA512

    d6c1b1148556ee27d155e495684305b359f47496a85f3fa0deef26d7b43ae2a98c3b191e208d35045ea85d8f865378854ea15795a14d4f94a7afcdc7010c0d45

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    08f505084885a3d1f135cf98c7fd9ade

    SHA1

    71512d291541f7bae68c978f847c9ef976bf9d62

    SHA256

    d98f8e29bc5226c90d64c5904f6a8523cae3c8d9955db7102aea5c9816f4c66d

    SHA512

    443fa5431b3133c23d446e66a916b70137b285647352811bea0e522ef0ac171e1afdeeeefff2c44ec6407b0f61acf5433edd0849868b091e363720c3add48e02

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    14673ed47fe93355c0359c477560e683

    SHA1

    6832219adbb075eeda47b1cdd9b91f3cca0fe9e4

    SHA256

    0600d33fdc73efb5aa329467aff1a54e63ea182ed2cc47e9fbb1704bb597ad7f

    SHA512

    e163a01cfe824932b967e01778750602156c25927431e9fad92318c0a2df0cc3caba760f023d0037adfdafad65223adb60acec8c8c25aeefad507294558c8eb4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1957f5d3923108668f06e5f518800421

    SHA1

    52363be6c41a7e9d127f1c8ff559c5a94dade43b

    SHA256

    f707dcf13eeb747c391e422b8ebe30eb9cbb81e1976213dfe3f166d52bcdfd64

    SHA512

    8eebbe25a785a5d398add4b76225959dd3fe1022e742a49579e16c4fce01b1f6c475ccdf7eea8fb0f5239cfef8de0d647d660074965c2b90c1f6a8240794d258

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8f25dd339cc68815bc9bb45432af1195

    SHA1

    4966c06d0be5a2ba2a8eeaa8d89aab8a93ba946c

    SHA256

    efd008d4fd1c40eea37675523830714e7e684adf88eb1824a3eb66b1e89800fc

    SHA512

    a3842fc65cfcefcd48cc8096e537cf99c64926fddfa36be5cff4d2af24cc9c296ad28e6068796a05b777768a8a94eaaf62202d6f8701543f3628452b1ac009a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1afd598e1ad49a5e49be5acc70695712

    SHA1

    5c6628fe1f9eb79abed01e5cdf64004638688efe

    SHA256

    624d2036bc04ddfa1a5f88d8d6cff304b613b002df3e8db8a29dfc47c3e2fb2e

    SHA512

    18a35d0444971d10066cfcedc7d8a74a0348fce11d3a0649cde7d5d4385b75bf6b51e385fb3e31c4e7a4094ce69acbc44d719a088fba42564a1cd389cac7ccb2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fc4f3e00bc1ac5fd044c9f2efda99c0f

    SHA1

    26d2fd980b51f9df685363689f77e07614ef6db3

    SHA256

    5755954c03296ab21ac988a047728dbd47599bc034a10711295a8fc1f69b3b2c

    SHA512

    9b4919e978b9da99eff99c248e0958c01713803e659a32b4be1fb6b1405cee9139639847c7b25ec86baa0ecd3bca83031ee791a2f3a805d3b79ab2bd5a5896e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5a9ba8c950258098d3a396a718fd4b8e

    SHA1

    898e9633ffe70a538ff8f52b1a336d666f71a71f

    SHA256

    6f177e1e027fd1a89e5dee03806ab8f9451dfcd2be059410960a2ac291e8bccc

    SHA512

    74e64d4dac462255133a3e6096679da1a9e8f76c2a93b675b68bc212e3fa9ef48d71eb872b55d68362b1d510cb0f423a56495fe458447c03bc45b0101af1a4fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eb6a40bb81a9b6ed6cd2b2dbbd6a35ad

    SHA1

    ea36feb21db93af8ae5187ac012ca84e5728837a

    SHA256

    2121f216a620db9c7ad0ca31552b44940f3a2e26ce00a4daec56d98c614d1b07

    SHA512

    28375231a05cf1c2a94b5e1d3787802faa09edf8e44bd89f8423f6e3d7e5c08f09316bbbd1b1493537300aed1623932de8c8df4677d2f3c22e8ab4fc639c4499

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    60c0065f8b035701060024c5ac4e2788

    SHA1

    a6b843d55b95cdde973d940f14e8d6383a9280ca

    SHA256

    96920f19916f1c920dc63e632374d3beab121f221567963c264357d0f7df7199

    SHA512

    4c594099c56445bfd20364dc32737f210adf9512fc8d57a7c0a6b7612eb096c31cca8ca51977146deaab006b9d6b461aea602b48554dd18777c2358742c169fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4dd6513c5282b4ceb90cec6de8133efb

    SHA1

    a75cef2bcc10af37019e9f3d6537e0a9ad2ceb44

    SHA256

    8751cd9f5080d481dc7304e0aae26567fe08d955784e750363695c2fc16e1ffa

    SHA512

    422e27e7d6cb19add0d318d3a224f599af4f3b26a524dcfed2c4b9e71d7cd690ac5ac0c0ce7fef591b7ff04e44987c97bfb47780822d2d51bceb914226525ba0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dba5a584c2fde077dc4da2ecad198ad8

    SHA1

    6306b6a4ed9b72f0870b7b8dde5880ec902acc00

    SHA256

    32c288ac66b99dc6ca13a48964b206759459778b084154704c012ecfcd7b1c6a

    SHA512

    95b539d61c5879e4b4a3cbdd7d214a70b17718ea7ec5d2f6d6087c6b98cab99e53465711c457bc59c2b0ccd8e970f1395517e9c72978dd9574768e0f600d0f41

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ac1e083d49bf18b2c02cc6e6571acc49

    SHA1

    d2a86f0c2d52480a5afbef93cd162ca5a7d9f8fb

    SHA256

    61f599ecf784d1c2f3fd59d4d17d309bab20ed2d0e8b17bafc61f1ac5bc11630

    SHA512

    6985409709e0e5a2af709036569282da926fafa635590f5dab1fe9bac4777927e3e57d41b7c455d1aed097671a866238c35001429b365716a678ede1aa397344

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0fcd5ef06ffc6e2f5813a5f5827ad835

    SHA1

    6486e86ea99a6d41c68d2255d6a45be3a8a476d0

    SHA256

    b4bf66f86bee3aa290ea008378e31b65f06b4303e222b57ab9db51320a959d2f

    SHA512

    96a2890b2f733bd6e3c920ad81d05f8061b725a44dd089b36f49ecf42179c8b7a142aefcf58b2e18af2793287486b71426119abe6633bea8684501448165671c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    748dfa465b94c6de2f07a7f73cad57bd

    SHA1

    dfd1282bb5784e90561945bbbf756360d220ea19

    SHA256

    ad23910c6d7d6a7e0b922356a640c79167deae57366469ed32f7c6b68a6c936c

    SHA512

    dedcc300517b558adb4e8861bdf70ce68eecb0745e26b2d89a4b92fd13bfbae658465fde19ffbaf6a2d1c687afbf53a40fbf9dea708d4e7bee4071a10dfcd9cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7e55af47d3e52850741f37c37c32cc5a

    SHA1

    642f5569fd5a36a2d1a61463cefef95d38da5d10

    SHA256

    22a1468a1228bb697c0164acfd54cd77afa3957f7c3fc6bba7ad3c9f0abe7ba9

    SHA512

    5bb0f03af1fbda5b9a575fb81d311238de95192101aeb428b4db8e864f15718f38bd2258502dbbbb8d711d6d92f6d0022adfce68e5f9e04822a8ca50169b3e6f

  • C:\Users\Admin\AppData\Local\Temp\CabF21F.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarF28F.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\7395e16192b4e5afc20c54da5494d4785f9c76f2810cbd67c5cf128b8da3f703NSrv.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/1796-18-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/1796-20-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1940-8-0x0000000000230000-0x000000000023F000-memory.dmp

    Filesize

    60KB

  • memory/1940-10-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1940-6-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2096-450-0x0000000000400000-0x000000000056D000-memory.dmp

    Filesize

    1.4MB

  • memory/2096-449-0x00000000000F0000-0x00000000000F2000-memory.dmp

    Filesize

    8KB

  • memory/2096-7-0x00000000000F0000-0x000000000011E000-memory.dmp

    Filesize

    184KB

  • memory/2096-5-0x0000000000400000-0x000000000056D000-memory.dmp

    Filesize

    1.4MB