Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    132s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/12/2024, 11:04

General

  • Target

    ff9b409c5a82be5dc8743693b8be43b8_JaffaCakes118.html

  • Size

    156KB

  • MD5

    ff9b409c5a82be5dc8743693b8be43b8

  • SHA1

    7829f62651a7809889192a6810f27a09481ea9e5

  • SHA256

    f297a3a9cfc55ceec0e7ef55e6762a906a42051c3f884710f95e59a9502c7e19

  • SHA512

    5d99964d668f372d8179c811eae8df01cc0eba92b1d713f9919739305392254f6644b16c0f75294d208529eebe03ac5710548e52d3a1f9af99cdff4cf10b4986

  • SSDEEP

    3072:iuSx6yFqFyfkMY+BES09JXAnyrZalI+YQ:it6YqwsMYod+X3oI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ff9b409c5a82be5dc8743693b8be43b8_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:876
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:876 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3060
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1680
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2452
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2220
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:876 CREDAT:275468 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:316

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ecf4f4fdd105a4e27d23eb5c9ffac253

      SHA1

      71c8b4dfc78ea2ee51ae3cc105ea4c7e6a3cb539

      SHA256

      1aada6ca5bb6539e7b3815aaadf9587c3ee22b0470be92eba6871dfc945b0cb4

      SHA512

      c4c37a4cfeabf762ed3c4aa856863e2c79eab02b472a225e3d183def5e690a6598925f5fa29a5d946280d6e4daee0e4e3de41095cc80976ae9e97f2609f05e75

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      783e14bbedc4eb4204f2e11d93a5182c

      SHA1

      c1acba5e3ac430402f760c370898e2a314fc486c

      SHA256

      a5eb3cf2a73201c948a7c6909e4c452af3b6da8e0a68cbabc5e6398fb060fad0

      SHA512

      b018277a06a1ab02739e8a366bf700d95c7b8d33246e3b2cecd35329691086889ea5fab14b6e4930b61259b23c942a2b4354c7f03b2f571380ee3d6f61c3fd30

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      65ab2a8de96e76d8af4756499da8d3c5

      SHA1

      d120f18d8eaa74e954ad2aea513a06a8abec2341

      SHA256

      ee32b03408b346e4cf68b558c2cf8707f9f62f71e5d2b91192812242214378e1

      SHA512

      0eacfc59ddd51b3530f8505234a6cfd343d60b4e2ec6d148d339132da8a651023d1f1e039b1c7d80d5d3da8127089a77d2a3ea09dc1515162acb648b4dd98fe9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2cfd5b59a4fec77df538ac2d3ed83532

      SHA1

      c5eca07571b4f9b5ac918123e59468fb96a40686

      SHA256

      ac9e2836335c983aba39d6f84979c18b447072185de02ee1b52f1d3952e866c1

      SHA512

      06b83151860b62393c4015f40c8d1931064603946f3ddb5979fbc53efa16eb44ed841ba49d9d17aac86e24d448935e857642735e110ddf08d9dcc4d587a51702

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b013d41d927176f93546a3d83306f5af

      SHA1

      25d8d6f2929ba1c843bc7ec2ccef7f245ed26589

      SHA256

      df553b0f8f44c574aaab425eec97c8b4ac1d896824b2ad70af249e6b9e717e31

      SHA512

      9ffb2a1000b7992b2737ebea8b6500b916f9617cfa829a405f0e3d8066ccd0066ae294018c1839c161544c077e7028ae50a40f6beb50a5bad73c217fd4117ddd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d9711ff22baf96b3ee66586b2d51acf6

      SHA1

      d1c1e75cdb96d3945f1c8188e1ad4211fdffa92e

      SHA256

      db3a4f58fc0633d005d3f339766266f8b5ba36bf2385e50998f648dfef0a2019

      SHA512

      31893f9ded50d2b0f5d8a06f1da8d5c0063921ec298939420c0aab38c6779be7e13ebb4025485b2e13f7e5663dd5b439bca751d77f97b5f83109c9d40a644e64

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      062405b00ae02a515994bbe5dc19f3df

      SHA1

      386c1bc87e374019b5bed2770fe68fc019cf04cb

      SHA256

      959ee9f57215f75f579690052b3e75eba4cf864e3b34338714284183a251d7fa

      SHA512

      48140b96d895040f7e4d7e94a438f37a1005be4d2b26e654e8aa06bed655f8eb120cbead9514b26117125a0e468f07c543ecc687f340e0a2bd41b1ba6daa5606

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      bf508a68000dfbd63953065719fcd1e7

      SHA1

      25af50b175921bbeed2b3073ee23f2c115844993

      SHA256

      065007128ed1bd816369e9cc66b8cf1d8a9f5c55e6f1ef568a69c720b93cc6e0

      SHA512

      fe71b544c25fb19221bf747cecee71919cdd3b5ec5008a482b1a0941983ed5e40206f8a6d3cd3b71be192e8bb61aca85ee963b8f4e0aca56aa92b44c1e955351

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      97845471306ad5fc6322da65cb38e25a

      SHA1

      6f7d259e595ed5ca56a6593541edd7eaf9f034f5

      SHA256

      984d8cb41147bb76bea72df905bca5c13a533e945057849e3bb363959bd2d14b

      SHA512

      5973268084a7280d74f7c1317292aff8d8d2e53a7598104bdc0d9fe219fb209489e0d698aa31760ebc737988020047118e9b85ac4e8b4fb82a3848d357cf0e7f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7bb7ce72a56a9341d79476c99a7634a7

      SHA1

      17c796ff9f01c1554411b63424869a4d6f1f1885

      SHA256

      af92078942cd243aae09b65b319ddd4426b925c6f3e3283a75010d38d61d7c43

      SHA512

      5819ff4332945c4c7c041148095561d8a47fa11d18348e7c922b7cbc22d1507ba4bcd7c1d74b78a935352697a895c4423c45b27b7941ce7a0452e20a004f361c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7ec70e00610f4fdaebe010142cd5f6e3

      SHA1

      505ca1847c8c75703a168a100b30fdcf8178ac9f

      SHA256

      7d4170231625920288fcefcdb081ea142a507019accdc70e5fddc7dfcb06ec28

      SHA512

      63f0c934f00065b2e95d74b16d70f07565dd26c3012a0785f305b99f87edf057734b7f6d54cf326d21dc562a253f0c24ef3b2ac4ce08c4c3199c8b55114d7a8d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1f608dafeb9f64e42267f2e68566911d

      SHA1

      d7308727b5676f89c272b94f2b9ae0291ff374a1

      SHA256

      1d555b5c97cf70fa698ce57788c3db57fae83eadfabc88be643a7df71467783d

      SHA512

      abea84d4520f5450ab6934d690411743778212644236d3c8ab91400ca72306fa72bcb8fae323af0a0a37d6aa9aa0701fdc9549733b33520b21902d74768f51e1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      273338ac6b01d062cc680211690674b8

      SHA1

      b92972a3fdfb93a8281eccb2c1d40e99d6e2a879

      SHA256

      d54b60d53d0a89e9a708d68d70636218659f0a7022dfcebc3adf0e5b3a8ab0a8

      SHA512

      d79c49400c93b90a5ef0a6956369b4d6c6e7bb15bd42d64d46fc9e029530b07c6c44c10a0bc14879b9d5e8f28ad4c9c0606301636d478c3f95696e0ac7781d8f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5255b4d6842542febac0f72d69a9f55c

      SHA1

      759f0086eec73d19ac161d69fdaac720f2d75ef7

      SHA256

      24b8d809c8590d16b7781fe66a7c508cc6840cd9e1924f6d9eee965053ff0b08

      SHA512

      e8ffdbeecb0a037f9b60d2ed0dc765bfc90bd24fc6fed75fcf2cf7d580046da0547a2d8c9a1b642bd456c9e66f72c77641852e7f3bb495d91c14e4ecf8e542da

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5792abdea605dd73f0d68e0b8218c873

      SHA1

      2ced64c2252ab40ba1286639f35f7206d8bc21b7

      SHA256

      9c774dca0bc1ac0b886429c132b5e0b534a6c917120ccc80960321703e3f3094

      SHA512

      14c321af82b94741d8d0644f1cd05dd7e28b2775819fbe2ca925ad3206a7e3f063e6fb54742f20fe3ec7bfe30b147aacb684651292ab064831925d2d467d0b17

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      91a1787e774e2543f7234add912a68b3

      SHA1

      1c1de97c0138f16be74df0144129f62e811d4d9b

      SHA256

      8c6057c05e6ec09d006d817ec99e46369c8b6b860af3a1af936e242da881f562

      SHA512

      b6fe8c3661201773c5fa02cba768cee8afa8267f257020f42aa8b92e890b41f0a318818aafa95d43f3e8d346a5541bdf79f0f35a22fed3329c1a2b869faf20b9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      07901ddaae638c94f88d30d99323b4e6

      SHA1

      6a4194ed5f63be54b5966a40bb3e22903c7a1aab

      SHA256

      1e50ba517e2e490e3fb852c1f7d48d34af399e02bc70af2b4f557d62badffb3b

      SHA512

      b80b3fcab771c9a7eec24cf9dbe4cfcfd9d285c30c9766167ab57cfae7814e94e2cf8d9a190d51da1e442522e9e2e00f0d6b90e4c73c082b33a2566fc7e87d72

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      79607ff2ef62be49eadf640b86744770

      SHA1

      f321620c4805369889779b842ede9b04176bde98

      SHA256

      5d5b46c1be52dcff7bad7a441a04f8ea1fee3ef21ab6f4ac4f9409652ff6a045

      SHA512

      7ade0a8218f1e4a49d4a61f0a08d9d6a5a659fc56ee2914f46033fbb45701cdddbc1029fa198b59031681ce77c3207583b3cd9d311dc3321702dca699d34e9ad

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      25a652d7e456c8ac868526cfe38aa3d5

      SHA1

      e9336413cefb2d8260aa83dfc5cfd59be7729556

      SHA256

      1017d504ea846af55ec7903db107c640ec8365ea0b1396912e3cebe52c9b284a

      SHA512

      2e7945cec5af5132e6a87cb7986fcbccfacb2bf69548099102cb956fba2b1882e681648e675d476cd00ab548993410e13db979429fc33cfd7506ba106d2f73e5

    • C:\Users\Admin\AppData\Local\Temp\CabCFCE.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarD07E.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/1680-441-0x0000000000240000-0x000000000026E000-memory.dmp

      Filesize

      184KB

    • memory/1680-436-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB

    • memory/1680-437-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1680-434-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2452-447-0x00000000001D0000-0x00000000001D1000-memory.dmp

      Filesize

      4KB

    • memory/2452-448-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2452-449-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2452-446-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB