Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    79s
  • max time network
    68s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18/12/2024, 22:19

General

  • Target

    6a3204a26737f6661fb5dd55b60116d6994328858390901eee926e3e8365ffe0.exe

  • Size

    376KB

  • MD5

    a951593191514e883bafd2adfd921679

  • SHA1

    974d5128fc2af8fa8fa20f732ffec8440c3656e1

  • SHA256

    6a3204a26737f6661fb5dd55b60116d6994328858390901eee926e3e8365ffe0

  • SHA512

    7e394564e5d1352e8a5d12589118fde9d56ea0ea84f16cc3e56054fd94b6250ebf356b70b30538a07a36f8955904dee2473bcb312fd7325f5b1d568e81a1300d

  • SSDEEP

    6144:WGPEvbL4+tRfb9puSt/jbO/4MvJZju0WBD3HGYqkY/xPMuF6U:WpX4+tRfb9Z9O/pviBUkYNhF

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a3204a26737f6661fb5dd55b60116d6994328858390901eee926e3e8365ffe0.exe
    "C:\Users\Admin\AppData\Local\Temp\6a3204a26737f6661fb5dd55b60116d6994328858390901eee926e3e8365ffe0.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2224
    • C:\Users\Admin\AppData\Local\Temp\6a3204a26737f6661fb5dd55b60116d6994328858390901eee926e3e8365ffe0Srv.exe
      C:\Users\Admin\AppData\Local\Temp\6a3204a26737f6661fb5dd55b60116d6994328858390901eee926e3e8365ffe0Srv.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2676
      • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
        "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2740
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2756
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2756 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    daec670520a063cff2bde3dc86f6a63e

    SHA1

    2a41393324282f6baae9fa8cc42760d19355d559

    SHA256

    d0603eace4bc95d6cd5c22edd615b796b0fa45bb1568179eaa6bbef09385c45a

    SHA512

    119320d2b3d98dabd4da1bc2f5311196be4ba3bb1ea3600cc3b32c5f4f874267aa09976e5dec2c6188a2076b5e8bfb37b7f2849cdb129b052596fe0c13142cfc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f135ce201f675e4aecacb6878e7f2106

    SHA1

    927003a9e9f1aa32c2e42a609370928b190adf3d

    SHA256

    5a5c4cbf015b7a8a78d723143e78f69598ebe59d188d8c0d517823ba2cf1dd6c

    SHA512

    ea80f8e3624d2091369ec861254e715f881da161a13ba36646939efd568d4cca7bdc929d76d02fa43af0e1ab4a8b5cd1195b2d8f52d21aea7e39c56b94b65ee6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    150cf0772223e35f019d229a68bc0cf8

    SHA1

    091848e4ffa3e3c2e43e7ee6bb3c1736bb9f3310

    SHA256

    f417c8f3542a817d15aef168c6913a141e869ddcdd608b5d521de77192c33e9f

    SHA512

    0aa0b4c5d98b655153cc2dd4a1a4cee414d2142196124bcd0b4bfc4538fd45c409507fa284fa7a4f87ad8250cf7eff653e3ef3bb2a2b512e8bfce97e21dc3d5c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2d4fcfd3a7d04c79bd235d76bac9cf12

    SHA1

    fa33eef96f825cad010fb3bf17d29124f7a2bb48

    SHA256

    71ee4b7c04d1e95656eec501b153cf2151f885b58c61b2a2b00610729c513c97

    SHA512

    b6b74f2e0b30d7d15c50af06428b45f3e48fe635eb3ffef17b3b059cb05d0ff62fb571f6a0f136d759d45fcfd480b0a5284605dbdc412cc55cf73e9decc059ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    68bd14099106ca595a4026ca0ebda6df

    SHA1

    fde16dae4202cf57aadb2ff13d38936ef1fda011

    SHA256

    9d49f8ef76e54f8f5f8a31e76f862bac7c37c96ebcf3fd39c0d682fac3b7026f

    SHA512

    255e90a814e64a888de8b8b0412af04828a71f9ab6b7f33323746026c6304fb6b6e910783ba136cbd5d10083e05a19d71cd57b1d630a87a4c85f9dbbfb77b7cc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    50d0202a94950b260786c99ba94cd362

    SHA1

    0b44ba90dff142ae11225e2dc8412bb74acfdac8

    SHA256

    018d6efce3ee43a8d603c5162e32c6a9fb1514770c36ea379ab9ac3d95c42dd5

    SHA512

    ead299d1b9cab86d9fdd5172520e89a5c461993ebac5b1b0caa2f9b3e64cdbf3251f41ada62f9cfc3e7167b624516ed3a8afad8990cf8b90bb34f61d15e76ce5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    358eb38ae74edca06db5cd507be410f5

    SHA1

    dd7850ae93da4c74b4eaaa4416bc7c2d26ea5104

    SHA256

    37cb9ef4959935280da9b4a10fb044931f8d368eae3612590f806dc8188fd20b

    SHA512

    aa78b9e363877fc6e57131e434d4378d1db93997f2da2868d092f4645f6c94e4d52cb5b926d65504ded6381500ff31fb3fb4496b173e368953a384534eb9899d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ba3ae9096473850096953c0117322b63

    SHA1

    c4d887d8bebac8268a8a4b47a84bdd147865ace1

    SHA256

    269c31d10de325940ec5837ee7136a855530b943a0cafa87f3556ab52e69dce1

    SHA512

    5bfae881d48660bdb0ab065728d82c76a96c5c174409592114cff38037745697fe5a9dc0754059fe8094e446088cfa19d1961ca66d1d94352d0d129bc3d014a5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7294891b5b60d033b65cf77fac7e4c4d

    SHA1

    0cfb283f34c3f5ac752fb9b7f14a11db9c3cd3c5

    SHA256

    fffb9554f284e5fe870f46046870c9b5f6937b8b08a769038537732060775a82

    SHA512

    36d887306b4463bf7a93ca89d112695441520b92c05c45b179802e92c386e6f5498f9c86722fed352fa17b44723727ddb3b18eb44b6d37ef0763a45742f7ca78

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3bb0f335578936f3b2595ca4ed32b4fe

    SHA1

    0ac9cbce02505abce5ac689b3e9ce92167233931

    SHA256

    074b5b3ebab9bcd70a5b2bc34d846c949984f061d1e6558d29613a27f03551b1

    SHA512

    9e00a9b44df71e6240ab452a38009d5684287b5f1dbb3c4d7cf762751efc9837e5ab469832318a998812664dbd9bdabcada0f2ec179e4b569d8b0138f644b09f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    352a0ec4bbc1fb8952257b8e8b34c8bd

    SHA1

    c79238f18213e9310df37f1dac6a5c9ab7e02544

    SHA256

    0a3f988f7437991ea9db9d64e9d6966ebb6f4d1fc73553ea56bf04a56710d94e

    SHA512

    bcfb1593ad747e73521c8e3bef240e865b9e7797863776a91b80280f739d2755c939a85a88ce5cd6f229f67d0dc121940da96e85a66e2337d4fe463e38799226

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9609ce6d0812a3af2d02bd105d2ce4e6

    SHA1

    6410fac81b837b461f674c1f3fa8878eba3e8980

    SHA256

    64916cfd523cc88875ef207cb671b2a78995d9b3a0300539515688abea5b8743

    SHA512

    a2bb42b6b39cbc1eaad862c31608557db1bb7ae501d1011fa52f29651ffaee730587e2c20976a0b2cd8014ec7e1d5aab4b363186c8a189a3f64a80f65921731f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    307edfa6676220be7dde8ff9caf8cbb0

    SHA1

    d6405d56ee01ef6b53c1b611dad5ff9808ccd67c

    SHA256

    f3a3d0cdca07e8e22ebfd656c0419bc8dd1ceacd3d9c4414e90db88342f268a1

    SHA512

    ce074963b5ba645b6b58661bc83e81666a6fcd433a3b955ddeb787c30ccca20f00b89d7d5c9478d6721ba6df791cce8fbbb5ec16f030d5f0ee1861cba6423d80

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aa6aacaaf6b084f4f8952f1cf0f995ce

    SHA1

    09250d333b00068608c782a3c8066535ca164996

    SHA256

    382883e3f358b8e110b843668227d33d515da8e0ed22582c64e18eedeca9ff47

    SHA512

    68617b71d67ed35319a95310b63fe7d1d796df9479b64a48b44469b71d915e909281d9df8beb25c353a1d09242d1834a68964b56a79514d21313182caa3e46e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c2765c4223e2e4b592cf33908dfa641b

    SHA1

    25f114d670394f975e947ea4e4f8c4832c254682

    SHA256

    23788f46f181c4c48e2177b1582339934440cbed161d42f027c3d9354fac9f6f

    SHA512

    82bf830e075c647f5b8b49a8282c23a5c727ead1a98c4aad3ae029e4556c53ac44be7675fb233f2e171c0f2bb014106903ba96edce432309b2c970e5b7057158

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0f8dee7484353f34975340860470daa8

    SHA1

    b005b64123d4b7044f0a73ac85d96dde69d8bc1d

    SHA256

    7699f48391be69a208f0dcc7855d222604067ef65486400c6e20ef7dc641a3ff

    SHA512

    7bea46fa9c5c0f5a321543e3195b3d2b534ef7b42ca90ff9caf707a39454e22aa33bf4a71e76fe2e7c2a1e39547c9f471279f83f7e70eab45dd07425e1b8a103

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a9241f49ef2853460698c986e1ef1ed2

    SHA1

    68a559e580f705327314bcd922883ac854ed256f

    SHA256

    569f3e435743caa0b449f26a4536c0c36417696f15f2bf57c9d8b88b141305a1

    SHA512

    62e2b10aedbed4f9001028f76552e4948961b3e3b383671f4e3ed5ba634a6efca66ca36cd8cca6966e081cec6871dc49a4a972eab9158f7f2d6835e3a4181fea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    029d2e83bfd305cd45879f06b9dd886b

    SHA1

    1a89fc2a1d454fb951cfd493cd7ced6b52a53ea8

    SHA256

    81e3e6106c07ded61202e2234d429ae41606dbfd7337a65af2a6b2b2c74ba77e

    SHA512

    ce6ce56aa248b7381303edf52909b019f2eb8af5575c9e8b582d49cd87054a882d50d985ac7ef7e9e9c1257a7b4d3bd8f75b18abd881c436c63e533c50877774

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    57cc217cc35c7ab1ef5b8e9ceb410915

    SHA1

    d2cc18220c5d945fb90064f8d08d86dad47a539d

    SHA256

    4cb45b84b36b025ab1750b1de1252d9ebfac789e723fcb416098a584be36db79

    SHA512

    1dddd313ad7be1d6979b411eb6af46efd7b96791d05e140e69742da6ed63f316ca44b6fd7d14066ed9ca827f29b1b8c728cae1fa2720d9e4059f5a8fa71e46ab

  • C:\Users\Admin\AppData\Local\Temp\CabFE20.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarFE90.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\6a3204a26737f6661fb5dd55b60116d6994328858390901eee926e3e8365ffe0Srv.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/2224-22-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/2224-5-0x00000000003C0000-0x00000000003EE000-memory.dmp

    Filesize

    184KB

  • memory/2224-1-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/2224-451-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/2676-7-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2676-9-0x00000000001C0000-0x00000000001CF000-memory.dmp

    Filesize

    60KB

  • memory/2676-10-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2740-18-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2740-21-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2740-19-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB