Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    131s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    12/12/2024, 04:37 UTC

General

  • Target

    e4b933b371f4f4c4cd0ed427ff8e14f4_JaffaCakes118.html

  • Size

    158KB

  • MD5

    e4b933b371f4f4c4cd0ed427ff8e14f4

  • SHA1

    700c56f0303fe9b3ac7d6eda4f77fe4c44069fc9

  • SHA256

    4ca941f99bd953753e377ceec3e6da1408fe390ddbd910b05babccc7787e9d2f

  • SHA512

    3308fead9a9384975dbb5c324abc2b6f98e33ce0102ffcd4c9b2761b3595cb79a6516319aabcde6a5b0c63e60f69e300e5060239491408a59feebcafc3fda05a

  • SSDEEP

    1536:iPRTsfpLDo6cJjD3yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3om:ihATMjD3yfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e4b933b371f4f4c4cd0ed427ff8e14f4_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:584
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:584 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2876
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1592
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2624
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1800
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:584 CREDAT:1455117 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:876

    Network

    • flag-us
      DNS
      www.ol8adk.top
      IEXPLORE.EXE
      Remote address:
      8.8.8.8:53
      Request
      www.ol8adk.top
      IN A
      Response
    • flag-us
      DNS
      news.share.baidu.com
      IEXPLORE.EXE
      Remote address:
      8.8.8.8:53
      Request
      news.share.baidu.com
      IN A
      Response
      news.share.baidu.com
      IN CNAME
      news.share.n.shifen.com
      news.share.n.shifen.com
      IN A
      112.34.113.148
      news.share.n.shifen.com
      IN A
      182.61.244.229
      news.share.n.shifen.com
      IN A
      182.61.201.93
      news.share.n.shifen.com
      IN A
      39.156.68.163
      news.share.n.shifen.com
      IN A
      182.61.201.94
      news.share.n.shifen.com
      IN A
      180.101.212.103
    • flag-us
      DNS
      news.share.baidu.com
      IEXPLORE.EXE
      Remote address:
      8.8.8.8:53
      Request
      news.share.baidu.com
      IN A
    • flag-us
      DNS
      api.bing.com
      iexplore.exe
      Remote address:
      8.8.8.8:53
      Request
      api.bing.com
      IN A
      Response
      api.bing.com
      IN CNAME
      api-bing-com.e-0001.e-msedge.net
      api-bing-com.e-0001.e-msedge.net
      IN CNAME
      e-0001.e-msedge.net
      e-0001.e-msedge.net
      IN A
      13.107.5.80
    • 112.34.113.148:80
      news.share.baidu.com
      IEXPLORE.EXE
      152 B
      3
    • 112.34.113.148:80
      news.share.baidu.com
      IEXPLORE.EXE
      152 B
      3
    • 182.61.244.229:80
      news.share.baidu.com
      IEXPLORE.EXE
      152 B
      3
    • 182.61.244.229:80
      news.share.baidu.com
      IEXPLORE.EXE
      152 B
      3
    • 182.61.201.93:80
      news.share.baidu.com
      IEXPLORE.EXE
      152 B
      3
    • 182.61.201.93:80
      news.share.baidu.com
      IEXPLORE.EXE
      152 B
      3
    • 204.79.197.200:443
      ieonline.microsoft.com
      tls
      iexplore.exe
      799 B
      7.9kB
      10
      13
    • 204.79.197.200:443
      ieonline.microsoft.com
      tls
      iexplore.exe
      747 B
      7.8kB
      9
      12
    • 204.79.197.200:443
      ieonline.microsoft.com
      tls
      iexplore.exe
      779 B
      7.8kB
      9
      12
    • 39.156.68.163:80
      news.share.baidu.com
      IEXPLORE.EXE
      152 B
      3
    • 39.156.68.163:80
      news.share.baidu.com
      IEXPLORE.EXE
      152 B
      3
    • 182.61.201.94:80
      news.share.baidu.com
      IEXPLORE.EXE
      152 B
      3
    • 182.61.201.94:80
      news.share.baidu.com
      IEXPLORE.EXE
      152 B
      3
    • 8.8.8.8:53
      www.ol8adk.top
      dns
      IEXPLORE.EXE
      60 B
      130 B
      1
      1

      DNS Request

      www.ol8adk.top

    • 8.8.8.8:53
      news.share.baidu.com
      dns
      IEXPLORE.EXE
      132 B
      196 B
      2
      1

      DNS Request

      news.share.baidu.com

      DNS Request

      news.share.baidu.com

      DNS Response

      112.34.113.148
      182.61.244.229
      182.61.201.93
      39.156.68.163
      182.61.201.94
      180.101.212.103

    • 8.8.8.8:53
      api.bing.com
      dns
      iexplore.exe
      58 B
      134 B
      1
      1

      DNS Request

      api.bing.com

      DNS Response

      13.107.5.80

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      24b7d03ad60986393c410257fb8059a3

      SHA1

      46ddab540e22255d706729103c37978dab1b7087

      SHA256

      d4aac1dc4d258bd557fd0606e5256395f34bc87f49bbfa78f9620a5569cbe294

      SHA512

      94f86282adbe2d5dccc7a213516ba5c2553938f06968da1ec7d671fed5e7cc79bb3d26ad2872f8447354e2129187abc5a3df1663f9bf924e5f0051b0a246796c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4bcea9ad1fc7963022893872e8f1f5f4

      SHA1

      bec11799178e4bb908a1680522cf3c155767397d

      SHA256

      dc46ced275e14c455ed6086f40543afa83f3642af0479ba93f90acb980a7397d

      SHA512

      e6704b28c8db2dfc3d18ffa13b3d8fe3b5c1d50715e6d8e0c05a4b9411261ffc95b6f17776185945b4f0455185fa6e435a60a566733fb7e3093c2d2efc9d8241

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a0655826c39b56852f29f750244a2287

      SHA1

      c71c8047b3c8562c8bccd4400677edc5d2b0591c

      SHA256

      3a5e57dc6cfd832e10850d4726e93344500ff7c2f89ba0361e5d82e0003a4a64

      SHA512

      124895aa5c76f7c5e85c7b29fb31e8dd6f9db9a58a00270646f91b83676df48bdd6f40087f3e09f06996c6a3189e352cab5764b7c6d58ff05485a27858dbf7c6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      80e10e99a27ebc1dc1be3f192c9ad238

      SHA1

      ae2acf89ecd8420f996aee823715762d0bfcadde

      SHA256

      d7f34341b4d3c4e8d011d62eacfc4e2fa8c49b5e4efb22d493f02f5679de2e05

      SHA512

      9855ce9c1920b12fff893ffe8c7774ae40f369d3c56d9ad6b62a040572632c0aab3eca6c80aac811929060dee71a4e85bd12e28f262feea39ade6cadcae288a2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e69e3a9f423f9f3aba15d41075225fba

      SHA1

      1a1579688c913a833fc3179c913a3393a0807749

      SHA256

      3c240235f7bb3d8468b2ff3c3788a7f6e82d68ea4ec179e78cd1d303329f85a5

      SHA512

      4cb986140eebc1e5aabd4ae89923920dab05f5cc1b493e12fef6d1d6417cb7abd24627406d957be59467e722420799f92cb849fc2423dfca8e6dadd5b8110cef

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5a05c78ae4ecd6369079a21b136ef3a3

      SHA1

      829095d17625deaffc5f745bd1b306f5b8f58e6c

      SHA256

      aaa98fe957cc64fa370ad98d9adfc94370e49c7eebf68f93a298775db9cc3e04

      SHA512

      73f49bb3f7b1c3bb9a2246b166813273663b616d13041c6ee8bb1d18d5c74b426d77b85df91633cea5b26faabc0ee046efd69e5bc0db28a7cdb085ef9864d237

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      55c347226d85d7e442ff5e7340431ede

      SHA1

      cc3dabc649156181bcc3fe43a8a49e94dae179a5

      SHA256

      6265449704ef6a605548561de2695a176c7c16aae4739b74f1d8a5d9bcb7fc3e

      SHA512

      f65d997743f8517a1a2986a20178c00ee46fa3f81ca6fd759a6f787765910ae7fcb68ac17e42d6dbeeaaa4770f051362aa5c43fe19baeafa3baa88a59666f999

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      82e3020e728d20957bb21b5c51f5e9f3

      SHA1

      b31d1ba44bc5e41c1b298a7d3eac6c032084a303

      SHA256

      b85a0f2c92af83fbaff825cca75339d2629498066a8a725c47fc4c1aa42a6662

      SHA512

      ea586871846c9a11a8c3501b92f1069fac6b80441f1782e451e247b2102472c722fb2302fb78ad4c421f66d9bb419f67c7dc6bebc8e8840ef86feb1617170421

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2a02a059a0d76da144661403fae31697

      SHA1

      38ab721ee2144e8e33eb610eb1c2004fd7ae8aef

      SHA256

      598f8cf98c6ed3a1c22ba6ae10b2ae93700b224d4064f645801ca1e94914fc85

      SHA512

      7d259163c3bb3c5553adbdde7702f4cf212a8c6be33f16864a4edb3530400de91bca51c25634226247fbc695c2501defa99d335d0ba77aded88f6ec17777935f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5bbfc59a49a39b08d7100f30d319cf47

      SHA1

      a8840d002450e08c7716ee5aabf105e63c8452ce

      SHA256

      52f9e5b780a7fde25a8ecd10f55c0b86a53cd0cbb269501bc903b58056666a72

      SHA512

      b7943ddb4805bc54561f0fead98d73de5880f8e3b34b3d1c1237559440b38eef86d86399bc47dde28394ba302948687f4a9ca0150e77dfd3f7b2ee8f37d7c28a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f718b4a140eb6987535b7ad3a4449d45

      SHA1

      37ad7c6598b54366cadd8b49ef742008ecebb7c1

      SHA256

      f8583292cba4ea4f90364da9aa86fd7bda1094e03020c02eeb5ffbb3e84b2175

      SHA512

      59c3c817d70b04be7bdff7e160f8be6f58d339da602d72ab46a82ba39569a457b7ea384a2d3a522844b8c99a063c0ae8a8af00f305dd1ea69da04aa0ac21c236

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      02eba118155048211cda5edf78245013

      SHA1

      d7bfde958e451b2dce295eb0537e61045339781f

      SHA256

      bbe3394385c6cf08a5a3305e482967efb576d0c8016e836ead546106fae5ba11

      SHA512

      717b32652b0ed1b7a2daf0d9942d9eea1e8daaab31f402ec78032b75d5dd2e33dbb92dbea5caa37e3bede5c5a089bc93fa50646c6a1f392fc6d776bb265579f6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a991968efafefc09b2bc1e35053cedf2

      SHA1

      b44fb92e3cc4c22fff965d30e4d0c8d1864f350b

      SHA256

      fac370de736aaa39b1244d05200cf7b427568d3be5897a80a74316c77eafcd38

      SHA512

      4e3c087202605c6641b64f9f5e67461b83ef05986a423b56c0cfb816e7d96358a3f4d7660d3ffc2abd2246290d2e9c58ab536e1af878a3516e2a60a86fd18544

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      11061e2b074fd2978db4dfe71ee33651

      SHA1

      a7d3d49e6fb758ea98c840d108072f460f35d1c8

      SHA256

      7d20fa677f1be24d1e9d3158d7f07d3a695b1b8d4e97aec1c810c03ea1150f71

      SHA512

      8de335be8849587455af6413358eb0c89fda1c3d86d9d5d9816df50d12b1237fa28fbcedb51100f104ffee809a7bfd346ae58213bce26dbba7b9cfe99dc18993

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      54c529be148eadb4abb2914772a31a37

      SHA1

      904c2db3cd67bbd4dde202aa48062c4feb2f8d85

      SHA256

      3c91ea2b534b815d3db1d80ab46ec6fc63fc19e9ed7b879746f14c7a4d009009

      SHA512

      a12182cb7a3b78a7e5ae70416dee7c028fce3333bb65d0fcf92be565e98425b93f80f3411ae0fb41021d9f47a68f8069fb4021e93bebc7c2ce11f20ef7cd64fd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d7af36011b7b3741f59a4f6abb59ea5a

      SHA1

      f5ee1acf8009eb3006cc6395ab229d52700d035c

      SHA256

      9b6cd326c22bb7f5f7d93140762503af6d84c9cff02c99ad3ed4c2bc9106a41d

      SHA512

      f26158c38fc5c125a6a4b81ec1e40b6e07a36fc23ea2b06e7601bd5135aff48d25c389033f04586e5f8514209a49f6d030f7165d887758cc7678a4d9918f9767

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      971f9b0d31461b2007c51a8bb0e9e05a

      SHA1

      f97f35b77ee106fe591eca752b8b7ec6ab2d1596

      SHA256

      dd526d3de608af55aa1fd95d07f47755326317e3b4724a88e0f2ad9f6bb8d41c

      SHA512

      ac2c1ff874dc01510fc5761a3879299a8cc5525d617c3dcff760f5ada11ffc14312d42b92e0a1614672fa37768cd80bc1308029bfa358347c84a40acf253213c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      669437e7f8cd8ecd720b5d1b0dfe93ba

      SHA1

      b3df69f0d0a9e126d7ae6351a5fd22beae4cce05

      SHA256

      44ab2b692bda0b7a8483a7c1611c8cdb8009d1ba80e51672ef6ef6595affdf91

      SHA512

      09bf40de258ae63a036e2f52c3de36c1378e31cfa158bbea0a38e1119d496f41e13ea2a49cf686e820f79599d9fddf8aedb0e7466f408a04dc02bc8b39322910

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b25e805c987395cbfc509d3c9c0b35a0

      SHA1

      cd121be36cee6a488ebc546cbefd9a9c37944d16

      SHA256

      b2d18c889b51dd37694ce895d7b677ce02dc5c25c41b9d1cb12a8458726fdedd

      SHA512

      bc13e49d458647694fa8cb29a2f6e26cb10c68091e084685a0032e989b6675be29a53ee425ad1a13fc55d23ef57245fc3ecddf91007026822f63bb569def9bdf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      fde62870d32f90fc0a005b72adbe317f

      SHA1

      3ff00161e33182e9867fd7a308d5ae551e145939

      SHA256

      905486b605763ed93c977785f3f0796eb5412dbbaf1fd9e31e5fa20d020579ea

      SHA512

      9d0ef95065ab0579ef91fbf91c731420b48f198ee8399c50cbdc67b9d676c20a96bf7b8f937be03b1180f286b3c577a18f553fa0cf82eaeda30699741638ceef

    • C:\Users\Admin\AppData\Local\Temp\Cab7264.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar7313.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1592-434-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1592-437-0x00000000002B0000-0x00000000002BF000-memory.dmp

      Filesize

      60KB

    • memory/1592-438-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2624-448-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2624-445-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2624-446-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2624-447-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.