Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    94s
  • max time network
    67s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    15/12/2024, 22:19

General

  • Target

    b148e1f297b197270a2b86e0d59816e8034c1d2de6f70e323ca69206dc98053eN.dll

  • Size

    100KB

  • MD5

    3e0a89a9a0d3672c8b83f8b92e505600

  • SHA1

    3d86c4522fa405ce0515ed0f6614a0ee731db225

  • SHA256

    b148e1f297b197270a2b86e0d59816e8034c1d2de6f70e323ca69206dc98053e

  • SHA512

    19e391593c5618196219f0b7da82cb579e74a6b15f43eceeb0cd248ad6cd66847f3167779b135bb3b01db38fdac8450a438353ee6493f3cb1b813f2e5ba45d53

  • SSDEEP

    3072:bgris+yd148kDuWQezI2Vn21gWNSU1901e/UbQdue:bgre3DuWQeMO9Ww1e/Uze

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\b148e1f297b197270a2b86e0d59816e8034c1d2de6f70e323ca69206dc98053eN.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1760
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\b148e1f297b197270a2b86e0d59816e8034c1d2de6f70e323ca69206dc98053eN.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1732
      • C:\Windows\SysWOW64\rundll32Srv.exe
        C:\Windows\SysWOW64\rundll32Srv.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2444
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1036
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2796
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2796 CREDAT:275457 /prefetch:2
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:3016
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1732 -s 336
        3⤵
        • Program crash
        PID:2172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6e8eb21dc300aad45bf3dafe28233ea6

    SHA1

    5d8077ff879bfab4037ca3f04d89381174f32503

    SHA256

    a3a2b2d1db7677601eb32a74574ae8ae46294c6df07ec69e07be122d77992c83

    SHA512

    c57670e6cc75e571ad2c5a072ac9d343db3f488be3bedd5f9ea78587798e4347cb911f2c67e6c17bea7688f329fa60cc7f73f7148efd87d908462995d9b67b82

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e5d266ae6fa4d02544c9ef99c23b0d7c

    SHA1

    ceba69f911918ab8189381374509858634807825

    SHA256

    e925652d30497d4f62096874f8f79f9a3c2a76a6090348c086c1ca80003f26d4

    SHA512

    c1047fbfc11297425b9c8ab50f16ffb013e59f3419ec51fbaded62f13e88db1d778e6586519c3f2d56dbf971748a4afae02b9d46f3be1934ed1e3b077dcd20f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5ad25f2fb5e805ae55ea379df315e1c1

    SHA1

    7e80a1a9305cc1340243d7f5f9f5cca71f1416ab

    SHA256

    e2eb9fc66bcca3fbd3f9d993144a3f901d4daeb02bc1d91c0a5d86ecb1812db7

    SHA512

    c9f6a7c0643a56941df6bad31966ea0595c40aae11ab53c37538063e20de31db952340718aee14545de54b2d0fcbfe66ddcad383005dbd5089e1a185b407ab18

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f925c516a978984ffb4ba40530d9d242

    SHA1

    676a190ac0c6d86c8c0ae0d33fbf85feed875dc0

    SHA256

    b1571701ff6564d5971c8a1afc0e3ee0ac1e7c17a293b034d407d298c83c50de

    SHA512

    18c43226c6b89291680504c0879d35264e50c2353cb55b82641007b1f82463808b097633d865cb35d041db9445ea8e59b7ab5e9aed378e807830b4ec5af81acf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cd5de8abb1ce69b1603bcac4946c319a

    SHA1

    4b423cf54a50ee61765aca9b2a62998b85f28286

    SHA256

    b92c988c9fd6d54c28cfced4c666a16d9f7acd74132be8a396c6f298b857f360

    SHA512

    679f1019c7f5a26231a5cb9b5cef1b7911533f9a0587ffef54f6d794220346274cb16b1170771f0e5b11099779e3a0796d176354efd73f4c3e41b69713a73f49

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7fbdf1193b3b06dbdf28fa180b214d57

    SHA1

    537e3e80f6d8c2a6f0d17feae5695880574cb003

    SHA256

    64d3e880460e6cfe104997432adc5ee5b28c0f247050fd4e66cd05386731a134

    SHA512

    7181980a3badf697f990de55b5af70879b031d1a7de1e295cea890f26f36e281f9ba1266285055471307ad18288fef63097a78fd16d1858a52b3129fda62f812

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    706dd186445478e90eb847105adbf048

    SHA1

    54c87a8618d653fed579115ca73ef3a3864944f0

    SHA256

    1a4abc72c962d5048b619555ec9a6cbf3a1780e9deae8e273dd66354b5369b02

    SHA512

    c832b6d515dbe4bda78a323f7d48569a16cd831cf83629d4aacfa6bf631d17c4184e9a1f89508af672be3ff8869d768cbcc14272e3dba17cf963d2a6c61543df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4639b306fe52d51fadd69decfcf4cdf3

    SHA1

    547cff2354aa70b6943a34eb4e14d954534c2ba1

    SHA256

    dde5e8395f0fe3da629b5958c0ab0ef055f1e4ce80b46fdc941c9d9f18ee4f00

    SHA512

    7ad3900faf76987722d60310f9d5fc8fba7d8b449cc6d08db3a8e4176734f5131315748f4b5a7762c67e7aca607c3bfd1741821db6845b7a2fa76b7cd070669e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    383a1baa7da095251c57559ce51f2710

    SHA1

    26069313ada5f1f9129a29861565c37e2d588ef0

    SHA256

    35da73ce26b5004a833809f694dca86ab5c8388215c1192091f93eab01fbd614

    SHA512

    5b6b6ea45073a3c867227176a328507a9eb46cf57b7aeef579d28093b6259a56e72394ff885bb481289e13f2223ab95e926b9d504a98322a9c14230f73dcde24

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eb250dff85871ef4b5f7a0ee9b7fb2b2

    SHA1

    ef2caad02d0d0531277a4d7ffe2159732dfffc9d

    SHA256

    01fe7b2eee3a0d2900ac616a4b4171e711486171b95203a732dd2804150e78d9

    SHA512

    7d5747694409482790d22f0152c0091ff4543da0618fc402d877e4752acfabc83a1a94fb6254bc296548471a22d0a71a140c74ac2c22554784cb47ecd9c9571a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8b62424e4a83f53d50b0fcfa9cddf734

    SHA1

    789ca39f74755f241804e939c6e525cc55d7102a

    SHA256

    0c1d54177a7ee1125070eac863d877a40b6fcd61af7416af1d8e492f97429cb3

    SHA512

    6e690771db536e56e5f3503ee03ddcc417b43ddcfcc4d5e70a34d922f4d8bf2495198c35b9036fc599ff3afb945846d41ec39e456930aba45fe3ee7ec89a6763

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a8876d992bc588184ba160f029ff8e35

    SHA1

    da5aafa4da8a8b7ef0f04e81bd7cf16c06ca9970

    SHA256

    1e3283220b0da7dfa2203f378f0aee9233fd1c8c95e1a534cc59fc33cd3c8139

    SHA512

    943ae142b431e82642ef91ee9ffb741ada0cc34d8d5443e3fdf9d7631fcbd3654cd3701e4eafd01cd47080229377cb9eca32c8a0b964f19c41cceae0f7ebda82

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    20ed07cb0773a8cff08f4e583ae148b0

    SHA1

    37e3fb41860748d92879f081dfb0540f30b8f714

    SHA256

    ceb8e456d58e312b6c5fd4bd7d4ee859e3892f1be3886763aa504a7cfcb5b892

    SHA512

    7548c37f4f87f9f09921b29295d0432b5741c150fe1adcaa6859331f957a11f86bf651ff2c065ffefbb6b821e2e17ae6c461ebb5541e8e0d08d23f5977dd526b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    94795dc40843f0d8d211cf4be554584c

    SHA1

    fac11e0b9902477964fa01cbbb5c4bfd10fd382a

    SHA256

    7c90dc1d425d4ff3e07e0b2e50b052ed27a37152f47367db5c296faa7e1bba97

    SHA512

    069b6e0c83090aa89b7b87a3b9cb2b4483a5afe13e08b375a720053e522e1e1a8f768c9852d3c07cb266bacf1a6b94e4ffed1769aa10e49d9fe8067f4aef13a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    922024de25bef6748fda6c8b988cc8e7

    SHA1

    516781bdfb8c9739f7eb1dbe600c0b6c53bff277

    SHA256

    d92fcd6970ab6cb010b62f7f71c03a3a287ea49c8355ef57e2c1d319b0ef2597

    SHA512

    451fc12709a12b764606de8a2a3b79f42dc834f18d51c2615a84d49cb92b03e1b9d871f06d19cd7eeef4ee70f08bc60ea42838b2b0fa6eeef39c877f9b0e9576

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    de571e5a3b0fe1d39b111db1dfee11e6

    SHA1

    2e9f0499cd32bcb7319fd94f70e758836dd4e2ab

    SHA256

    4034ac2f5a56b851a7bb645df0b5b83518322709446cda5b875147d2f6f3c548

    SHA512

    c3b52dc4104c120bcbff9846e9d88d4b33cff7f1e99de41deee8b5174f4b96dc086e3f2252d4d1dbc88a74aaf163c771e1679a9dbebf103712e6acfc299b92f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    43ca059af5c275b2b1b2b73913b029a9

    SHA1

    8f8be2586176e993db16fb64d880f64f37b24ad7

    SHA256

    065753177bc44972f90155ef74238a1e2c9dbf61180b562f4bfbd257cf89a34c

    SHA512

    d2c2f494cb26b33902e50bc1ada4f580267d148cc86d40c4571291342852ad06d0cfc411bbb5e0eecd04cdfc6fd440c85ffb4df94f099df3e0a87c455ea71d7d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    089a1d7458045c6168a96ab0e6151f40

    SHA1

    856168c2b30802cd76383900d000b6deb9300210

    SHA256

    99de155890d71fbace26f6701eadf5ef26e6c9889f9d85786151f1fb35601da6

    SHA512

    e1fcb2d6018203515bd8e7c7678d0f4ba574eb4059b5726ebbb71e6ae8f518cea61915e121299b17d007027524ef7d741a0bd5e5824866e5b333576bad05a8e2

  • C:\Users\Admin\AppData\Local\Temp\Cab7764.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar77E4.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Windows\SysWOW64\rundll32Srv.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/1036-20-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1036-18-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/1732-22-0x00000000000C0000-0x00000000000EE000-memory.dmp

    Filesize

    184KB

  • memory/1732-21-0x00000000419B0000-0x00000000419C9000-memory.dmp

    Filesize

    100KB

  • memory/1732-0-0x00000000419B0000-0x00000000419C9000-memory.dmp

    Filesize

    100KB

  • memory/1732-8-0x00000000000C0000-0x00000000000EE000-memory.dmp

    Filesize

    184KB

  • memory/2444-424-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2444-12-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2444-9-0x00000000001C0000-0x00000000001CF000-memory.dmp

    Filesize

    60KB

  • memory/2444-15-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB