Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    133s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    12/12/2024, 11:10

General

  • Target

    2dd1c0ce08cc20d8feb69add827307d7c13b913fad24d5baac727b57fbe93e2c.dll

  • Size

    1.5MB

  • MD5

    041553cb7591aa1b7558c67011a62888

  • SHA1

    08f5d512e6bed1a6da35b6797b4a7883e606d0c7

  • SHA256

    2dd1c0ce08cc20d8feb69add827307d7c13b913fad24d5baac727b57fbe93e2c

  • SHA512

    ceb16a73c2ead4e3bb9cc351c3f0ddf5e453a4d47e4595669778bd6d1102dee89406cbe923f6ab32a712634878c13e2d6b5df035cc5e5e6bc4ad3d100259df6d

  • SSDEEP

    49152:v00D9+r5bGoa+CJ2bz8TsYpJ7gT+XmB9:z5+r5aH8zCY

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\2dd1c0ce08cc20d8feb69add827307d7c13b913fad24d5baac727b57fbe93e2c.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2440
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\2dd1c0ce08cc20d8feb69add827307d7c13b913fad24d5baac727b57fbe93e2c.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2420
      • C:\Windows\SysWOW64\rundll32Srv.exe
        C:\Windows\SysWOW64\rundll32Srv.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2580
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2028
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2868
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2868 CREDAT:275457 /prefetch:2
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2940
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2420 -s 248
        3⤵
        • Program crash
        PID:2952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1d7a7746195308014773f013cbf3f6c6

    SHA1

    a6981b6e4d1fc4965c78210f97508dbe6d4de758

    SHA256

    3aa33a5d9ca1d29d9709ae5ef931cc0c967850ac6ba91728a411dae824ed2e0a

    SHA512

    133253b0a31b388bf9893e761a7c4e25a4860588f03b9b8620d3d0f3c0ec7714e50044c47b850b0b1a1de80647e3570758719cff11f346e97fd09c3e635680b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4f16ee9ec2d327b86b492c32aa644ec3

    SHA1

    a2248d73dd8d260f7e524a8f090c6af324feab91

    SHA256

    76b7c5af1546974274cb0612511b64cf2341013a35778ae124848bfbf4743ba8

    SHA512

    34db0d089554430c8cfcc79a3556831667c3f2d4c34d8b16712e716034ebd409ed1ab4719fa1aec533b504b156e2ab494f8ce9344215fee9a04f7411d6d37c3a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    07c519d2425a3f7fcafbbfb85aa4d3db

    SHA1

    826a06c1b76eb987fbe36fe148a0d9b29f029331

    SHA256

    29f6e5714b75a1e97c7d1de9877b3cecaa130488c9241c0a887f06910576ce43

    SHA512

    c50e6e2665fccbb7af738da0ab9f241e5e17772f9725d1e925e7a2ee04b92babbbba2bf8b0f1d8feb15f83c54acdf64720668e35481ec027e26663330aeefcac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bf6ed86cc7e19d60530483dd11dd5aa1

    SHA1

    a8e1954e3509f14304b705d7875d2252b06c8b6b

    SHA256

    34ce65e58330fe7245859d50aa9d181595d80187978c5888f33bc10cdcb6ba35

    SHA512

    483a7400195bab06da681c27aae98ebd81c4fe6a5f53a3d76086b2efa3bab03257193cd56f9ec2815be12a5a0fecb94f1d5010f51d8c9a979a989cf7d44d94ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5a01e482a698f0d063d7190cd25ed092

    SHA1

    f1541532a1565a7bdeb7801a3e7c7e1d5ff49fad

    SHA256

    fcc8bac854aed1100837456d0d1c4f7c468dddcfc56844cb5067d8e82431dfa1

    SHA512

    d10ac302d7d975835c684d05aec5fbb904661f48443654d0110044ab6655082b29816b00993757e44c7717a5400b8c67abb3b3e3c6dd1cc97c70a9d7266ad04b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ae95c21d274a20209f39da93490afbe8

    SHA1

    40f51d4aacdcfc77e399c549a2dca6e8154bdf6a

    SHA256

    36f311da2681215b5a6fbaa7203592a986580a7693210fe5217f8729f14cad20

    SHA512

    ee4627b48710fc59ed167b1b38865dc37efd67c6955336fcf53891bb732c89d8d98b578047c06242f48a44396cad594d640de415d61435d3143010312502c30c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6fb89ea943d6523eae7a9e0d6bd3fb4a

    SHA1

    585ef405575a1324cd9c92b5e810a32863b021a3

    SHA256

    5b5da47a12103c80affa228c5766c79d9c9d2fd049b753aa11c42a6b6635a159

    SHA512

    ad4c938223cef124fb9f2362c48b0708aead05bdc82f5e36e8e18f1c9a2b1d49edbc8f5df38d9692dadbd3e9dbfb7e65aa438549816dda1ffe042c67119af710

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0cd05741e5987899305dc75591f02a50

    SHA1

    a0a9110e2b8384f2745d081a89223cc384e392ff

    SHA256

    a95d597e0f5fc834fb325545d88b88c734be5fd60312ac88de79a4c7fc9cf2ff

    SHA512

    f953b214179e988b94b6c0456a95a0308c7208e3f96f7cd243ae215d0c9e07513fb05147bbd123d276341a9a263060be21df88d66bc771138628fe5618385d6c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4ce48750ef865f48c325309c8e5e7104

    SHA1

    cbe2a4cd34000a2626e8b05b1979aad9c2ccbfd4

    SHA256

    811eddd50ccdb2b28bb5e6fa619e9035e4ee91ec9a3e181580472aedb2dbe5bd

    SHA512

    e2b0a44dfdb7b84dd002ab65bf1dafd701a776693f9b77228214137fbef72de149c76c8d0ff2fc99c0476d5b4f25f4d8c43fe5964faea97ee5e533b8beb3314d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    42e703815d69fc4aabafd2304b998fd0

    SHA1

    f4d556b38f18274338f1b8e23de91fa86d4ec1af

    SHA256

    f58d8dd55174622f0982714eac743a9eab882f081790d069b5bf92cc1c2329e3

    SHA512

    a00280f6a8094bc612ce81ca6f3564352afea8f3070c917917a1fbae22d15221b045be9cd84556a44d4077ddaff88463a1edd59278c6e08daa3e3578edf7c4a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    edbb3204b83329a01200708f8439d0d7

    SHA1

    cbd7644db5a8b090a02fbb8ab18858f80b07835a

    SHA256

    8728d372c4ba3c929b143f6bd5bc0213bb85f84292614eb7197c2d623d633b5d

    SHA512

    a21b79eefa1795e50fc359df25614a1461e1eae0e23ce165aa8504f3a5c505b8b06fb3a41dccfb78276c5412c386b1a936b9c47f24ba9723debf59f9c6a39679

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7672bdae8b696a31f43acc9b236292f8

    SHA1

    b2817a0c51f942e170bc640ee3d8a703b6b7255d

    SHA256

    db4d3eeffc88c8b306732fdd1b13710398d541bd4dfaa76f078450e519942525

    SHA512

    95352062900b6feb283eb52bb86649bc78f34c3b1fefcec8b1b3c182c6029428f103c7401c253fd32f782b4c0ddbec45aaf28bdb1b07ccbfe8162f7d80780be6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6c8b498f5387ed0a66ff1a62acc32a42

    SHA1

    36acaa844471de481e9dc3a49a55a1cef2013a54

    SHA256

    e560f52a78ed5aa1eb81474d7f2598576d0980b937ec00e33698591661f4b63f

    SHA512

    d8c33766c55fe9664aec8098d31d4d41b3150d679147d063058f2134242fed44280ae7c25c9df4887187da4808639f943ae8b266eec3de5dc76eee22d835cbec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6c0962abcf39344987b8820f4c479e9c

    SHA1

    e0f0cdaaa21f3053deeb002dc18142dcdf474e95

    SHA256

    1be8924261e5c20c98868a6f9b3a48793f7d9604ba1adbf32df0c9dbcc80ce6a

    SHA512

    1c71e7a9f2bf2a89bc121199088aa568b8f28dbb0cba4607ec67ff25709ac656a9e05baaebc1c1add9603f6f7019b46be3fddc7513e0edcac37220807ed1fe2d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b3a4c7d7f723cc346e2e77955485d83b

    SHA1

    1db501a858c082c8d0c5c07eacda92b8d25375ac

    SHA256

    94eb9cefabfdec5bc85955023117f5366fb3e2aa46e8a3762fdc906d825fe2f5

    SHA512

    d3ccf2e88c3b74a81fef2701ad45c32d8724a56acadcdd8b09fe650a541f458450c05f5e1e5a19a73d345a773b6651f4f8fbc4ceda465c2fae15be274a8737b5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    181ff2313a1332694cb266e31d15ade5

    SHA1

    9b1d87a48b73983ae56d3288ff6d45cb349ed591

    SHA256

    92ab4bd5483641b5594f8213ee58e9445efe96ea7b219f3dc969efad17124479

    SHA512

    9093b552d8b457978f85668a75257debead3dc32bfdbf3b5436a51020f6fc157b80a9471ee9d27a9a0992a544bdad1da23d8b79098b71870e297bc8125077997

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    67fefe9d89dcebc23b678d0f07e17feb

    SHA1

    07e202b6b813904f8f83f83352cbcb7d9401eb8e

    SHA256

    e98bf3ed6618b59552744b391a76b03ba5f395f25ea75e81b9955e59aa9e6405

    SHA512

    2a1eb92e69687f993edd1fdfc1e55c36f46184f39d5b7b4e8c4933a1f4cab2d58cce5336f80804394e74bbe033dc9ef85a34f94b67b81ac2a77ae9f7b7856065

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dd401276ad1abef8d6b769485862557f

    SHA1

    49da3065a4f5a5118703efa8b85af81fbdba1ff9

    SHA256

    182b25883ac2a6b18fc18dbb8cbd3a1620066cbbad64871a1d0fc2d1f4a73715

    SHA512

    b55e892c28755080f519a72356e88359f0f92ccc0020aa4e17c70e95edba4a46e9bbcb8680dd219573b2d974da2f823560eb4f33d73595d1c3c58e540a51b1eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    697077ff06ed1d09f25a2cb1c3aeb3eb

    SHA1

    2ff2db69802ed94194796e0cdceb139d97901078

    SHA256

    c06ea25a45701236cad7ccf765f81d9d926ca43707ee490fe1c7298dc8a28d9d

    SHA512

    ad29d05e1f9eadfd6fdb5c58d3f899fa1ea784f54d7e9c38b20998b1ef0b0374fa8ab3e72056f7415a9ff62494aaffa5f206210a957c30fd700f126edfef3a56

  • C:\Users\Admin\AppData\Local\Temp\Cab13B3.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar1432.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Windows\SysWOW64\rundll32Srv.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/2028-16-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2028-18-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2028-20-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2420-233-0x0000000000200000-0x000000000022E000-memory.dmp

    Filesize

    184KB

  • memory/2420-5-0x0000000074590000-0x0000000074722000-memory.dmp

    Filesize

    1.6MB

  • memory/2420-2-0x0000000074590000-0x0000000074722000-memory.dmp

    Filesize

    1.6MB

  • memory/2420-9-0x00000000743F0000-0x0000000074582000-memory.dmp

    Filesize

    1.6MB

  • memory/2580-14-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB