Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    132s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/12/2024, 01:45

General

  • Target

    e424b3601c38af133e059cd9daf32454_JaffaCakes118.html

  • Size

    157KB

  • MD5

    e424b3601c38af133e059cd9daf32454

  • SHA1

    40cf307ae24b351e994536f14a8fbcc259e66e37

  • SHA256

    983247464f252939235772cf5682e0b0e2930f0be84420243ec2dfe857c8f702

  • SHA512

    62bab9a608339653a28ed076055cecbcf27baf6a74447af2101b6c25fbc649fca2db455c9a8b0da7013cfc35bae901bb8af3a3ae77775e0d3667f06ef892c2fb

  • SSDEEP

    1536:ixRTqAMhjsUAbq7HyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3om:iHwjsiHyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e424b3601c38af133e059cd9daf32454_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1956
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1956 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2148
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2804
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:968
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:328
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1956 CREDAT:537614 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2152

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b10b9c1db4b84f8e8c13737d241d78bd

      SHA1

      f08ee3a91f19869c5a723565063a1682f44f945b

      SHA256

      a6ccc1be65afa496ea3c93a8b6f1b2d90c9b1e6a93f51398431accd3cb367ed2

      SHA512

      4938ab7eb6c1261f648f17645c38137d40912aa611e56c39fbd02401261bbdcabf1c430b4576db1297e9112df9801f7d713e6749fb7051e178e4461f1949a5d1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2a21340f2ff67c370c94ff50a1d22b06

      SHA1

      7ba9f008309ee1b596bce9f2bf2919f5d318f7dc

      SHA256

      d211f57ed178ceced42c48c08ad370447dfd060eba4f2a8a0da78754b1478e71

      SHA512

      cd7232e4a570f8e4914925eb478c640b0e31a711896ea5c75a644b5b22a532407c3f7c3f84aae4f271ba32d785e5c592c9b7cce3b1fefec157583c1953d053b3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c32addab40e1f1d1f659eb1ef9a2c289

      SHA1

      a6af7c31e75ca2ba1d33b4bdcba9924ab9652e59

      SHA256

      7f1928899cc49d94220b97948484c95d681f194151fb53cb3c83c79808719cfc

      SHA512

      7b838917c5b6ac8ad994ba17f1e030b9a809d1b10eb352f3f4598d6267e7bf0b917338dd26b7aa0db788aee27d25ecada83cfc7b7e6c62d37fabd4098f61d59d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      db8fbeb894249e47e5ceef9206515779

      SHA1

      08a538d9ab395e040f9958a94d31525ff32ea0eb

      SHA256

      81383cfa7a7b2813104aba098aada6fdd3077c4a06b99f81bc1dcaa7f8ff21da

      SHA512

      2de0c38adcd93c0c0ad2085d752b11c135821db978bd1284a057d55050276b6a99865c776c5cc1dd8d18805437f2ee53346a4014e48707d9962c56fe5ceeedc4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      366a08d8908357ce1b05331eaf6f1ea6

      SHA1

      dc61a0a2e31d946bcc26b90ab6816924d78e5298

      SHA256

      c1651322de1cc714d08c9da7442d4719781150ed13d907b7c4e2a53ad566bfb3

      SHA512

      85e6bcb6fb64cd0557ea4de96184662e8301f4ee270e4444ee41c3c82c49a273539f5ae592f287dcaefe9efc8de08f7d2746b0f2ccad558866780f6f412b7a58

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c4017ad6c8135edc26aa32f00ea1c249

      SHA1

      eb4187f715184633ea77303a507f12c1c6d30a70

      SHA256

      cd35f816dceeec71f66ba2a00d2a155701bd2aa7be2d0d6a40981694546a9a12

      SHA512

      22ff509e210fa48d49c20c521a5c427c91b980ce95d66cd0c86647311637ec429c3ddd5f4f30a4a86021994500380c0d00d7a2c74e289ae2dc7ee4bd05701306

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b75dd8d3d9a48799d9b0985c4e52a614

      SHA1

      8edc889ed74fa7d55f0f54fae0cdfc51dc107318

      SHA256

      7cc4864eeb3c4be0caa32f2f819deda3acd85ea27e71ef99a9136ba10cf4d53f

      SHA512

      fb7f5eea2e0c2af781c5ccba08a1fe3fbe4f3742c7691c879e8dd29a969d30eafce86999e039c708c28a96875dc79a9fb63abae1b9f31282550a35ed61bb74db

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7a921fb869cb2ff7b742a295993d13e8

      SHA1

      5be06f2cdb13e1e4c0b695bd802e50987efa08ba

      SHA256

      723e9fc456c7d8d9556a3878b9e47fbf6c7fae8edb15185f5e70853fbd8bce81

      SHA512

      00a985b34791d2bb4f93d8fae0d02e896dd63623ac9fc05627051f5069f1b9aa6ad93f095c2333c44bef8d7fdaa1b6617527f08a28245416c6fc7bba7599d629

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7eb59fb711bd600cb2ec0c859cbbb40f

      SHA1

      bc5130e6505c63cefd6dfd2a88580eead767bd47

      SHA256

      0a945af54c81bc1cb385e2e184f5a5c9e2154e2b85a907e6308689e7a82784b6

      SHA512

      3c66bda363e0a3e9747f14d1f0cbb2d586a2c666b4adde533f467237067bada2ea2ff7e3c654fdbb21bf19b5dddd84948c370b0f1ee6d403455eb594481763cf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      04931f24380c2be9173b1cf78e6b92ef

      SHA1

      443ad9069506674a984f147ee756632a4b1b2c50

      SHA256

      d8165ceb57c8b17a58c3cc81c5ef5be365d6d50fe371da70c2b05c80384cdcd8

      SHA512

      58df6abf5ecea07051dc0edcc88b9a58017b2a6be12bae4b769acaa9d7c14ac46d40f9e90f8c0676f685c18ca736d43ac9bd5c7cd846dd07ab047e237f1b7ed1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b61256453a1ae6743684cc8cf2fbf485

      SHA1

      88f35076fffa78a8139eb0559f91e53525ce96ff

      SHA256

      c0f34e3c9efaaf14a571d1275d0bd77a93bd7f739fb13f8c82ec1fd63f746377

      SHA512

      df29a7514e71b33a493d04deb387ce773a303e2201f2b1629dc79e4ea27fe24d00a4de98b7e78cf66ee9148f350a08f8658e3531b4b18be9019a316a65bb8fff

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      fb7992ef67204613dbd8df16a0e83969

      SHA1

      b32ff259ef70c4467a2ff42414ca197ea10ac910

      SHA256

      8962b09b07b6abf16e368fa2ae5db50998be35395c0aacaf67c6f06c427c40e5

      SHA512

      09a80b4d8b2a02ed214ab44f8341beedef61c5868c00d7d1e61d9f186ccbaa7c8397c4617e7c26c260a4e8c96c5a077405bb3137c699c7f615c59a17d3cebf4a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      97aedc49b4b5e5c43dfcbb7e9c857f48

      SHA1

      ffec8e61b9e4f148f7824d63cd135d9eb2d7f44d

      SHA256

      918765ac652fc16e6de8d96696078af66f789f7ddc5764cd204a56828cab5502

      SHA512

      5fa09fcd80c338f3b0a6d6f5317b9b174a42ea2769214d948973a9860e69819cc76fa99e3da374132793bf3c25a90a3a2daf053c7ba5746dd98e6c79f9a48dc3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      84c8c644eee2348e0353a11ca89d13e5

      SHA1

      1d1835b43c5996f430b884ea44167f685501bb44

      SHA256

      acdb10949032ae501eac805af8bffbefd50184bf589876b3a8364d459c0cc472

      SHA512

      4568e38acfe608a503e34d5dac1cd8c35c84535bf4cb3bace43d50db80daf52ddd660da87157d45cb6e5a7f26c31690323dd08a6800db971dc7c509b4b08ca0b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      29e15468e509edd8ac6c351faf8cf9ff

      SHA1

      0d56eea0ced048cf9a1cc28c4fb14b3cb89adf61

      SHA256

      bda283ff98780a7ad63dc4aad0f3039cdc5778823f8ead1d826ee2d519326853

      SHA512

      2ddcba083a8012699cf18217ed0664c0a449d8ce9af44bb8002b62d51fe615837b2349272e0fce433ecd03d8cfbf65655d8b7b2a0a24544010fe60123d9f330c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2be1d065f648e121fb361ca91dc2dbe5

      SHA1

      d7317a2476f45c20f9a9fae27a27c76232d7d0d2

      SHA256

      744b45f9d454273580caece1d9833209ec9b21d7b1d6556c755bef6cceb135c7

      SHA512

      6d63a4657ecc9d1d731e51c7fe377eeb4c8188f83eb98883cdfc14dca6c8ecff1ba2a23fc8addedbc191c4008d50611853b54b2932059fed2a772d47d8cef359

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9225f066d618138f8a681df60c69a0aa

      SHA1

      12c75913600700e3e96be0735bd8c4da6209be16

      SHA256

      6411e2c6ebdcfa80a67f1b5676f24fa42942550103c7b5e8393570de785227be

      SHA512

      0f81837faa5b93cbf0b7e6028381419030cf6017951781166455b0f9ebcda223f3f0c30b575da7255c8a409f3a208ec9cfd2443564722b9cff1306b738ccaa0b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      127755841cc54faca0d870a1f4ac0df8

      SHA1

      c1d7fcb3e945ca393a22ca85bdbfa2902d11983c

      SHA256

      8e6a90f4d2207b91de282763ab6eda61eb02c4b8a84e99b60ad857222f021695

      SHA512

      efeb096994449e7a57ac14715c014d642b0a76bf7e817cbf357520a2a817baefd807b368ff52068bc4dbb6ed1cf331475cfd7eabe6f13f72f5b1f79fd23adbb1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9774a22cbe92a785af2d8cf101630fdf

      SHA1

      a0f4ad9075260ad1f03acb1791eecda28dd8a393

      SHA256

      23f0d8f827d68c06db3973cce5fd029a0340b4fc41e161442da65b2b60099aa4

      SHA512

      686c72e60f472557379af78281bd8a104896d403d97e7328fa4021a86e2c31097fa490fcefd179d15419909d2b3dea39d5f83c284715885e055f4fd5c9d2bb70

    • C:\Users\Admin\AppData\Local\Temp\CabCAD0.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarCB50.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/968-448-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/968-446-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/968-445-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/2804-437-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2804-442-0x0000000000250000-0x000000000027E000-memory.dmp

      Filesize

      184KB

    • memory/2804-436-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB