Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    130s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/12/2024, 02:16

General

  • Target

    e43f7cfb429b4b50b04c73ac7871f6f0_JaffaCakes118.html

  • Size

    158KB

  • MD5

    e43f7cfb429b4b50b04c73ac7871f6f0

  • SHA1

    cedc441bff1f60bc01541845af268aa9401f3641

  • SHA256

    f4788271f012058ccd3bb2673306414b1f5f1476d838e53e62828711619b92bc

  • SHA512

    f1cfd509f632fa865877bbd12f10cb98d5925cb1266e00c5e41978bb5a273df9d29cffae50daad6419bb718e0cd1e6aac01acf3a95afa64cd1242be60009c2b5

  • SSDEEP

    3072:iGq1BQZXlcmuiy7Lt5QS/2uh5bJBj9gtG1CGooOiHjUFyfkMY+BES09JXAnyrZaD:iGq1BQZVcmuiy7Lt5QS/2uh5bJBj9gt6

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e43f7cfb429b4b50b04c73ac7871f6f0_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2476
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2476 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1860
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2452
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1832
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2468
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2476 CREDAT:472079 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1344

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2e0f2ffe575ae7a5bd0640ce0982dbc3

      SHA1

      72eb521b88f155e1a7fcf72666e5a7d1e607679d

      SHA256

      b6d709687c8cdfadf2240e3987cf46a94a86c1c0ef64d73afa1e8bf46198ef72

      SHA512

      0b65f08bce598f17ef95bb477c78f640a6e69e995ecdb99bc2567e11e03550aa7eead1054fa345e2ed4b6582114883a76faded40e6fdebdacf282962e2de1ff6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d11fb8d2bf7311291c7beabd34810a47

      SHA1

      af8606f13abf4677d8456fc3e9333cbd97f49cbe

      SHA256

      917160131fc38bb2dff09119adaa2761da6f9f279b971809b54d4f17a66364ff

      SHA512

      886aee680c6509ba9d61caedeff8fc6d7e61ed2cf0b4e0b5d8952a93d8e908ce04920f50965657d49c1149eed58824c0047a4842551e03cc5e09a30ea51d8772

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f4eb37cf18a6e3ceb6061b47eab7241f

      SHA1

      10d0dfa9202500845ce8ae0d91c152110ad79e60

      SHA256

      85c3ec1d8519bea2445e0c69802176e8410181ceb43793b69ad1977cd32ca87d

      SHA512

      560e6b94e0bb5f3f7ca743062d8c5d1a1a76d7c0b28521a72b1f7b31a2fc8d2bffffac56067ff1870a39581fc3ebeea321d55d6bcb57a6b6499080a61a5f21db

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      88fa7e48aad9e021bf1d87522e4db91c

      SHA1

      fda9556962587bc4621727ee5932114e6d53723b

      SHA256

      1e05f9290249eb8dd2c564037d9189fa7ed3db7dd9bbc70397ff2f727e5a6348

      SHA512

      d8d34e7aa160705f00184266323068164ee2375e3b25a04d3d186542f967b80bcd163125ad8db6b1ca2f6f7e0deb279a66eadff3264f798a369f2ab1a89b424c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      980e7b4296b1cf83253865444a79a997

      SHA1

      2c0012cfd70ab90c3b0648df3c699c0ed2e94850

      SHA256

      b71b8dcb98e8c3d6f355fb2976a695c50c326501278228beed3e92c164e06995

      SHA512

      599b26f03aea64f860324bd1644840f4ff11680bb4cc76f0075e64e490e75fa89bd41684d8fdf0d59e04761c7b7598d945278f49ea4e1e4e559b4abfe2d8723c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      53a3b5b87251f066609bf7aba6b9fa27

      SHA1

      7574e2e0b8e915b22d2015590e136e226c081abf

      SHA256

      2d34e27c6bd0387b7fe730eb179ce7989f713e8d2dc2d39ef3b613234584780d

      SHA512

      5b64067819b40fbb2fc6e634e90f5ca5a666d8c7ce878325628482e51f14a29e8e0307ee6715582ff818de49a0471ac172db58f1e2b4eac0900c09c12359a040

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4d1a665e79e78f42ef194c801983861e

      SHA1

      f1e7c9073ce118af4940079cdb79b840b2ec1eca

      SHA256

      453094269f8fce0062b4dd44ce6b48542e036852d3fc90c857a6a0f2b45bc4a0

      SHA512

      10614a651738f4f54c09be1ec63e8b00a68e1776a56af1d22e31c319a8e674986ad6d96081548c2adcde21c8cb801e715c750dd3b21b702908140bf6c885eb9a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a824f6d452501015f6419f1169f0e7f6

      SHA1

      3cc1e727f939493251d3045aa78af1feb7ca1a8d

      SHA256

      2c954c90d71002318a4825b912f1cfac49d9252c2ef325f45090915b22897178

      SHA512

      edf85e01681dc2522648223d151a6f150074ae24013a34a3acf280d3eb80dad2beafbb3643bb80d2d01e43c5c66c6df2f01375e72ec2aabeec82e86abcc3ad0a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      973c2fc4e38fcafbf1ced337224a3c1d

      SHA1

      5ae0b6cec31f6a1df95fce9b11de053a4caec00f

      SHA256

      8dbded321f95a57e6409bc879c45f6a841afba719361d504b4fa6194bcd1db44

      SHA512

      56561fc8749c3055642252629924a3be28477c06dc1fb4185c96568d3b520d12d832bb5486231f3764da21ab16727a57cfa8cd473ff84e0ac4b8de7a53dc2cc9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9a29546e9e1090dbf4b2daab601f7365

      SHA1

      fd0d578d38c36b92a27370a15823b6c0700cd8c7

      SHA256

      508e977a8e60b3e7df279a91116f1d891cccda44c0823e3abe6c33624f9dec15

      SHA512

      0441d7185594ea89d4cf2c58fbbf2068e1c7ea3c159cd1688b772d96c9a62d523d7db53d6d57ca4ae843ed62d44e583eacddb8b8b8c5e68f3339c51513735d4c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d06713085579d062b6c7e23c01d54d94

      SHA1

      85307b7243d9b8145d489c92762859b0414cda71

      SHA256

      1aebdf5894d3f8f5575b8299e0b9a7a84121fe359039de8d392d828d5314fccd

      SHA512

      4e7ee9989521129135128501a1cad9f163c8143c46e1e7c0bec30e0121a994b6da586d87b0ab980723772299915796c20aed5e169c6acb9e8c9a55ede29e1e1f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4e05cf7720c1f597299a04de14f72a1d

      SHA1

      4d938bd061ce33b86241815a1668b6bed72f55bc

      SHA256

      0692b662587d637a78642a22b8f9b6554e5f76ac651350ed00a4c579907861c3

      SHA512

      46e1e42582a13bd2402265626058fef374fb3ce09bf62891964709c7b7e363354b7786fe44737731dc749ba1512629950e4d40b719a215e805e3c6795dc0123f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      eca0e31d77a2aca73b10e29a1202c8e2

      SHA1

      7753a0ae22880ee65cde167417688de81d05ae0e

      SHA256

      47d0ed74860c383f7be565a7bbf0cb9ceb3c844f65c6b2b1d4da0c002b3a2568

      SHA512

      fe7b0b25988ae8637c95e7850dd69746647d44d70ce192448b00a636223b75d80492725c3ae7c9f25eedea9a8ae3907f05dfed691c365de937eba3ceb4f45dd0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      92a52930fcfb04d1eabfbdbde4a01f07

      SHA1

      c92ae561644992cf0d95428280f2105e3eaca01a

      SHA256

      6fdbd5ceaa2c2407d190979103d52d2101ae70ef869f32bd2da3549dd0c84061

      SHA512

      cb99aeb1714268822f488e691bc49a5699d71bae45c4d0fb8ee50e3db63566736cc75ec5676f02690db90775c2515a7714a80560fac231fbb6f74f118b4e8108

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      48f2171bc8b56a2f7d3d830a6365f92a

      SHA1

      a9eed31ef7e40db59fa287c22bc79b144fb20b6e

      SHA256

      885c622a31d4323ab87b9f43003f9d068eca4d0720d853e4ca85258c240bdc00

      SHA512

      1f85e286f5e7aa09b10be1c2922ac8ee17171cb37135b27511d0d139ada1a8609ab5e9b9f2a4827944b12e3d1c80286b35fc18128d2a5723b7bc61b5898d1c2b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      315c6162732a1ec13134c4d0653f7d3c

      SHA1

      c2c8d44ecdf49e8932485ad81afd8735f363e9c8

      SHA256

      305427369fe326f92b7017150a279810ea051b5749af399b76b02cb25fa75abb

      SHA512

      d00e5c2ef2f127650bfa66e497d69623710667cba7652e8ed29f843307b4da9b5a5ccb93adfb8daaa298291afb2e74cdc566e216edc61673117cce9a9d7ec51a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3c9ba33f7ba4db03ffe62b4df66a57d1

      SHA1

      91db0d33678d38427631179bc9e2c0fb28125351

      SHA256

      a0f4621e087d12ea41a7d85e5463695b8d8cf731c30b7b9736a5e8ce9c26d58f

      SHA512

      1df9bcf0b09a48630d54fc7f2abbaa873f452c22df17153051102639058011f18358de63231a1e8c056fbd2844c5a9e7dbdbf6eee988b7e581649bea6ce81e42

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2fddf6c5f2df38925cba5a7378e3d9b9

      SHA1

      d5ce973f7699ff2c1fd76d5ce46024ad85158394

      SHA256

      a90bcefad5236fef77a40c5a785fb1d1999e1eb819584afe407b9bb2a48a4320

      SHA512

      1f1b831f99eb1897633c9e353867c12bbaebbf075f331590896ab35b9c44a9b97e5a46f0333f48d96844d62077b0a15e4bcb042921e8e2294d5dd3a44730b55f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6fb62e08ccce7c985e305b49f73f626f

      SHA1

      2449430322f7764f4cc127506a90e9da1c593bff

      SHA256

      7f8d27c526ec793c4d92022c4c20b97f0b5bfe274901a8fb544ad770f342752b

      SHA512

      576bb26f18213021f2e620c22172376292082ef290ccc92852f71553943c0ce178235de7f8129b533dc499e061016e4ee1576e1679d0fc2472377fb47040266d

    • C:\Users\Admin\AppData\Local\Temp\Cab98A9.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar9967.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1832-446-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/1832-448-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1832-449-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2452-437-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2452-435-0x00000000003D0000-0x00000000003DF000-memory.dmp

      Filesize

      60KB

    • memory/2452-434-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2452-442-0x00000000005C0000-0x00000000005EE000-memory.dmp

      Filesize

      184KB