Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    130s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    12/12/2024, 03:46

General

  • Target

    e48d7f2fe5cacf76d06801972442d969_JaffaCakes118.html

  • Size

    158KB

  • MD5

    e48d7f2fe5cacf76d06801972442d969

  • SHA1

    1590495fa104de5ec4c5f102406d2f930d8aded8

  • SHA256

    d4446abe5075c4a5fb68d1fa3febc941faf0dc389a74aa7a2ed66bfa4bf18a8e

  • SHA512

    d67220fc854cace6701cc894906e45a7edd57b9d3529397a777595157507e98dd77aaa7ac02c1e4341673c78c430222adaa4ec15ca24c96563e8a8741841ea74

  • SSDEEP

    1536:ilRTMTbH9JIcV/H8ey83mNyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09M:iT0YcVaNyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e48d7f2fe5cacf76d06801972442d969_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2952
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2952 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2792
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1888
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1648
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2996
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2952 CREDAT:472074 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1924

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d4ac53b2d7927f5736f9840ae4f31a39

      SHA1

      76d53429df6585f04258ad5183a6946cea6611e1

      SHA256

      f4739b040605086abf31dcf71045ea8cf2b597ddaa9be6ad0c4b6f4f47b3beed

      SHA512

      07208cade6f9ae72ac8b72a884770452440a57a61c075f04dffe989b8ed6aa5b5a41856609040a2c95150d1faa436a06b2bf5aff1de03d3ddc5b4c2979ceb090

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      eb9652fa2e625106765cf3d459456d2a

      SHA1

      1137e8ba33d597c305b9c9c2e3cc7b1d3fe63ffb

      SHA256

      255d367278a91e0d8f97092b478f75780d3756395b9c824f40fa1a617ee15486

      SHA512

      404e5269feb003ef67b6c1369beb846bc39111669cc95ead1eaae24f8c30db962f999a6a5cbd60f7b890383daaecde840b59e9e7b486f0ebf4c453b63b1ea4b0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b448b9fc21bc7a1e031cd3461877a104

      SHA1

      e78a0b96b5ffb0d7f8693505788b1786bea04ee6

      SHA256

      98c08de5190d6a22496a39db1f9c1a77a61657641cf9dc7a760436c4a510d6ef

      SHA512

      98e8b85085955b71c74a7a462a8bf2612f0918515f5830ca90565e6c0a054a692460bd7cc4d8d346260cbf2933daf4d1521df577136ed9506fb1256f26fb65d8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1a3eb8223b62fd2c0c57bfbffb13b87f

      SHA1

      8e37a0fc6bfed654361c7b7a3d72fe55e7f0ce8f

      SHA256

      10598dc3f86e5cec3f69977f5860efee520b02d8e1f1c7df0c6aa6ef3ab1f207

      SHA512

      356304f1620d24f5e01b124ea63ecce12e2d975b0e9478d6c25301f6796abcf81fc2bbcfe555ec3dfe8a71974b84780a3b4ff2cc33a810e2f9c97694888c6589

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      fe48606f9b9daaa6f6f032875b3e5c95

      SHA1

      646df3b2d3d1c50f7fcd1c0a7e2cf7f71dcff0ce

      SHA256

      3045333ccff2d8b40fffb14327bc860704a0d658744570b4fb4eb30af636182b

      SHA512

      60b20fd610c514a1c1c77f931028a2164d2cc629e84d4e0a43924d921fd16141ca869f986ac51f0734ec4dfb083f8f4b5f8c7b7a5f792872c084569ceccffb8a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      63acf546897b2ee751578d20b2c7ca26

      SHA1

      4a0586371e23486dfaed4e316806149076dfd97f

      SHA256

      8b27b44e940674f0623c79be96ac4f1b5d22d3011b5cc063fe92063876c6080d

      SHA512

      b7673629561aa521e045c46f49f16166e6a3a2517e5ba46fba72b085f3ecfe1b0c864272ff934fb095ef3902fa0e3416a889a30d89eddcce5176f935611d9392

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5476ffad978b47d9ed25edad589afbcb

      SHA1

      e1a557ddf1c2c0b648eb0e4a952a13f6b4d56ac5

      SHA256

      a0c6e5b1276b1342d7b643beb5b31fb94ddd8a8e1c868b07c7be16d044897d90

      SHA512

      4ae6777ca9b518c6e9832bcb578c08e77a851313520da0c7982f3187ab7e8b712a5892acb5cc852e0a99988c5e5a9b7f9a9a39a72ef04576a47ccd40a53ae981

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      677809bea56e4506e10c0f661812f012

      SHA1

      6945bfb3defedb47edd9571e3b49c2d65c281a14

      SHA256

      2dd2160cc6f7ee1e7a321212f78cb55f1a5072559c31896f5fa41c5dd37ada3a

      SHA512

      19a70a696161f5087dea3fc91f1ef7166c67b8e12798c6229d88187299848c25c208d15aa9d6cb466c353576a2acdd51b91022311a3fb3dbf75528ddfe025a2a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4f4ec7aa832ab95572d1a48780c8b4ec

      SHA1

      3bfcc54db7bd657793c56ba9cd76dfaa02fc3cd2

      SHA256

      3c462cd65514ecf6ad2ca5bdbe2439d05f95e87c6868f0c3533899af6260ec4f

      SHA512

      b4e505f792d0d254896dfc38189c6140d1890d2777759f8a81c800c302e6ff3f2a3ed3f9d1a47fe436d2ca9c1a131f0fb176938c89de6cf66a7d1f26096bf680

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8d51d5e73313002293d511b9c0efc102

      SHA1

      359bfdd974583c846e177058f72a6fa345df3871

      SHA256

      e6a9c266985cab21dbd99cf60120c3c482ef99b60a7d6ad618817ee5b22c48f8

      SHA512

      0cf87644363c242423c091b4747116a37e3e2235aea5398be7ed6accb615f6fb6c30160412c18aa78414292349e6fa94dd67172e76d2aa8525ad77b9f44c0a59

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c5686712f8a7b0904f6f47358d85aaae

      SHA1

      0c7b312ee8121cc4f1137fc8dd1227ab93aa4e46

      SHA256

      d3fe31a5d0aecc8e0d510505243da05a84d0abb7f718779882ad0b1ead1d7138

      SHA512

      7fd04c3d0e305b16d625d3671f38181b91cd73603d9ce317ecfc3b0a571e67d96d66914f35096deb21f5100559e7fa044e79e3e64c0cebfc7ef72ec61495dd9b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      287bac6e8a499ae1aed2762288beb6fe

      SHA1

      ceddb3c1a32bef8ba7a9d6dc7db855dc289422bd

      SHA256

      548b55a79f10a82f95de481e561f8c58a8f78d2b1b6f77d42ef310f888070444

      SHA512

      f375126cfdcf576fcd63157a1b3e294c76b5a310f0d7fc1f7fb4a0728cf41cbaa3ab1b8d2cf251fc55d9565d1d1d5562306999e5fea9bf7dc639d8d088065402

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e7caef605716c1483031f02729079aa7

      SHA1

      f84586db901aa05a32e5a2907e92327ac514c01a

      SHA256

      e432cdbd70de2b81e733f9905046fc0150bd818c0a0dc12ff683dda14e14fae5

      SHA512

      5287e3f951f18cf2dfe0f8f84d48d83b10016cc5cfb96d275baa93487a72739f5ea39963c6811b361ef27721ee20a760423c233d6ca1397e8d890cd41c1cf772

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8e98f6e42162767e5631ae051ac776cc

      SHA1

      373950a081c01fd6ad6e7af418b23f1321fd727a

      SHA256

      9310e7e8c8883e81d70a41a414a62fb4b132ea6d126055ac316d78c04d89578c

      SHA512

      95533816d9fe836e8a2c33add0967e73cd77bb82c64e67fe2044e01f289dbc06d6f5a4d0110c5e1abf1f9394aff046363bad4341391ae108d3158d65532360d4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ba27e4c71dd487d97ef2700e5f3fadb9

      SHA1

      f548c141c3663cc2fa779706c5c5e8a8545dcd53

      SHA256

      a6cf0b33124aec7390cdb2bda0daa12e03f26cdc56591010c3ffd74861a5d7c3

      SHA512

      0ed4b52ec0497a9a9464b3c7af3503d963c661b74903497ace13615377a5386047d8c16ce9c110fd272f5e47df30c87137b4d010be749aa1c118dbc4e2eccfcb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      61a2d53bbfeaeb0262040e81bc357317

      SHA1

      c0982e9cb87e6aceb10b8eb1563309398a635423

      SHA256

      b4a1db52876ebd1c9c68ac2aaf63ac32c1ee8c54597d64fc9e4a32cef3a3a339

      SHA512

      e3ce9134d74ad6c36118f1c7f2e83ad6956c5e0136b51163be2caef6b2a6d0624e20a3a34fcbca380a2af20ac87914d9db2514f3478792e2020eda61e850a078

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3cec1183745a3ad8e454e214b0d338c2

      SHA1

      748332b6175db25f366c3a64890aaccc53852169

      SHA256

      daa02c51d9a2b9773470118fc93094da79ab9bee81f8bfd14f0100ad4648b639

      SHA512

      18ad072abc3c6641d58e97de5185cb69fc2a0fb6fe813e629258eb00c8bd63b2eaa5071190caf073603d71894de9cfbfe4df511b523a1e6b91078f08adfedef9

    • C:\Users\Admin\AppData\Local\Temp\Cab7957.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar7A15.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1648-449-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1648-447-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/1648-446-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1888-442-0x0000000000240000-0x000000000026E000-memory.dmp

      Filesize

      184KB

    • memory/1888-437-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1888-436-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB

    • memory/1888-434-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB