Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    84s
  • max time network
    68s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2024, 23:24

General

  • Target

    e981b1dea44f3ea1eea08782583104e1f30cb314fa56458e208c34447cc2a250.dll

  • Size

    148KB

  • MD5

    21138ef3b2f50d45cdbd29fe6ad1edb2

  • SHA1

    8dd01bcd5101aefb50db7b23c0116c6e947a28ea

  • SHA256

    e981b1dea44f3ea1eea08782583104e1f30cb314fa56458e208c34447cc2a250

  • SHA512

    f6dc36b6ff073798933d825c388e59e8c5f596e77eddeac85e6383e1ed1cb238c82255c3b783d1b6eab71438ef6ce2ba9e61d6f4e6446a8ec9da3a2611364874

  • SSDEEP

    3072:CBbqirto6ttM7VmKeZ88Dkj7oR2SqwKJXtf5DGyVBQwIY6X4j:+scvZNDkYR2SqwK/AyVBQ9RIj

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\e981b1dea44f3ea1eea08782583104e1f30cb314fa56458e208c34447cc2a250.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2736
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\e981b1dea44f3ea1eea08782583104e1f30cb314fa56458e208c34447cc2a250.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2752
      • C:\Windows\SysWOW64\rundll32mgr.exe
        C:\Windows\SysWOW64\rundll32mgr.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:2832
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2728
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2728 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e406fee77b040135d31c70d258b0f924

    SHA1

    4763554cb9ac871e9a8b8732afa67b7586fb1bf2

    SHA256

    e6165c60d1d37f2205156c196cd2e8e4647f1a39d29f634fe08c2492027b613b

    SHA512

    3d6bc4d32d49cdc8933e3ea7d8e769c7d896d3fe9e62fdd8dd32c390bed5d71aa44b346c5ec38f35c7238122956a8d79de3d2fab03e2a27c5c63c73413a13ce6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    37626d7491fb82209444f65115e0d6e6

    SHA1

    438c42ea6dc947cafeddb1093d1fef47e7e76dab

    SHA256

    dab5940ea815c9e4e2c95f5a6317dcf957704f2b9f3c8c921fd20afa5ec3a68c

    SHA512

    139264a7ae536efb0fe6874a01cbaa7ac0fb4d01a78222a78f625087cc15f653b5a20846cc0a5b634f00713d804e61644d506e486ca63e616711cb2092f116d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4bf8c6a9a69850f899c4b8192ac66436

    SHA1

    ee90e4d4895a4b557cae25a20d807f6a5da498c6

    SHA256

    b91a7c952268d70afe8f766d439ed13c3c81cd0d1c111ec93dcd40903238e91c

    SHA512

    2cb50c7b64f2746b2fce6db76d1d7e5c4201c624137527a8e176da4997d58e5223ac637bbfb36ce2a5ba6a85e68115a06c27a88a0da36df136b55339b87ddf68

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a300ddaabfc6e4744b8a896b7c047419

    SHA1

    b445be03ac50105c4db863627a3b4c84289ebda2

    SHA256

    6a7343a2acb918486615b9a20a3674607950d8f98a1069960a2160b8f2fcb703

    SHA512

    7079cb77543f773cec154a7c37ecfeca526ab5596456345345b86d1b46c89a891cf6117b69055790b682292112f90877c2eae38c5730d13fc4debdf189434b13

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c97bb64936489b985fb382c023e71d30

    SHA1

    08854b07421c136afb5a2e2aecf8705a58097462

    SHA256

    ceeb612f26a66e4b869542724e5369154efd278aa0cb5878e4551afbdb727439

    SHA512

    105bb9d0db2cdd79008ca39bcb8334c87a9effc0f8ce93d8565b8ee10a1c09d0b6930abbebe65c17838174f2f16989264c9d36615484ee04800f81efd43436c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e6851dccd223b1a727e4256a224f979b

    SHA1

    1a00947a8ea5101ce0433d1a90b99f33be98aa06

    SHA256

    627e4f05c1bbf9fd24f1039179babce1c0a8c593ac34bbc6dd7277c708b7e20e

    SHA512

    140124d7605fd5a52d7e93649137e41d1635949c78d053e58a815b3de6f43aa7dffe7cc9c8ba4354b92e3dcd6513dca466b43ae7086f5e4ba066d8d4baee366a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ad5711f5650f5044a7c9deac08c058c4

    SHA1

    640368f42b17abcb6a858bdec003c34c29d5d89b

    SHA256

    740037462716f92b30ab9bd3f870eeaca4d1c19e5bc39b9e01525eab1f10b198

    SHA512

    7e50391bc6e42361e551892387920f18dbbe701a7e4842d975925b996e07cbe3fa0c94714b17c89109924d8817a0c44eec7622eb62523eb6316511639aca9f3d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2c3f4b7789b5ab68722b99bdc8a4da39

    SHA1

    310c8f7798496e316a9088a0d46d106b641f3d07

    SHA256

    c5b466126dc579b02a779d4caaaf6b7a79769cbd119b859179e80fccc7c8e74e

    SHA512

    f7ba8a86c5d0ed710d3885f3c35fe0188c52f3cc3f546df3a665514de1bae0697585694a1dd05d050a7ec7740501c649c3d8074c995c62e1fd2ebe0ed80449ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    53bf39548de9c2eeb279d3ee924d33da

    SHA1

    11aa53571142f9fb005098db059e39313441b779

    SHA256

    a738d51547254029bfb8abdd266d6ba5b59f1b34c6a722d071db079803785552

    SHA512

    e7111896e58aca16db37a031a27d6ca0d0a660f54ceb29cd9dd21099f8b3461ae048db52009fbcc673b5c5ba0cdef536b214a23b05b63c4453f6d7ae1612ca08

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    80c2a9bc2198b35bad1986ee3a8a7f6e

    SHA1

    94bf4d27319c5fc85af875d4dbe7277b5d33f40a

    SHA256

    6d0573434f03d749c668ff91c5cf4bd794e6fb76a5e74979f7091a5dba30c02b

    SHA512

    9bce4342d8083cd6eb8846e6cf8f2a1123e61aa1048ed81f016dedee1956803b9da59d62a10cae488eb0f2537efef78699cb9a0bce4204922b63f8fa3f59b255

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    267c0f161a9f0d6b1e2ddb738a06b33e

    SHA1

    d42b310569b5762a5b40e80ee528555207f42fca

    SHA256

    e951902816de50c38a97be24ea44f31d0d80f7d3981569f993b2fd4526bcaec1

    SHA512

    98e459f076429ae04a8100128e13f89d748c1eb37a31800dee058fbc17fecf7d168d33c24bc96db67ba876b2cca1c11f6de2c7c71349e9993ffb002da6221166

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f846144c1c7719f695fc971f044838f8

    SHA1

    a330c8341411624061d35df8d7632b76cd7f8d3c

    SHA256

    3fe04855e96cd6d3a3c0b1cd35de50cf6074fa150fbead22d58c11b7af444dff

    SHA512

    07c93a4e59362b500da79f6275d37dd705c213269fb0f380f4a9aa099fc2437dbcc3de469caf63ccac4623d541c692e50947f3a255f90ee666e284e102f6bbf0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f1390c9886338896970b15fc5f49cc1a

    SHA1

    e23db9cb20a218f97ec5d6ad43c17a4ae60f686f

    SHA256

    5e010085967fcd3e62de94d89c1507268efbd107c350983474e5e944395e1f90

    SHA512

    c30d17c8458d64be201167c80856c3e5122088497f19ef9d2f4d50c7d2040a0d5fd6e10b863d59e298c8fac8f04eae42cc0bac305ef8406c154ff44952c02983

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cb13f09d61e798a1c4f7242ba522282c

    SHA1

    ace9500845f161eca85c4b87be120fc3d38f2792

    SHA256

    5e34cbd0164407ac86d5fda504995df54b4d5493dda72ccc31f121f01f8e7596

    SHA512

    379940507982086ad7d0e714666023be28dd3b5b256148bb00e6a8a61bf4f2fafac829c086807c2c3cb92c8cd1f13b59ff5dd0a2c69638bfb3e006265d73ea13

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    410f05171206e58850da3ffa98900b72

    SHA1

    16aba86276e466d8aeeb171f29dced73dff3c4a5

    SHA256

    386b7ee6a4439482cdd67d397a2c54e045ad6d3152147f8bb75da1e4015bc148

    SHA512

    c7dfbba1aaf831e652b25e019fe772d556a89aa52379df6324398fc3fa1fb16ad9bdc40d2cda40b593bfba6fdbefb1bddeaa45492a8cb84cf8d84bf1b6229abf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    26b5c6ce202bf3c1e541bbf02102d9ca

    SHA1

    7371ea0e8d64b5ed95176698a67c6a91b1023d34

    SHA256

    b7eb7edefe392f85f080d38a33b6eb3cfa71b9d50bdc4f4b2702d05c01eb4b02

    SHA512

    948e323ded4bb30c71ef664476d02e61146eec4471d47da4eec346c6ca0fcc0f4925f487d0479eb83859f9940abf3d540fc2f816523157edae9a34c2264a9f5e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    88b5d5509a5bb869e9f0d4b1be719a6a

    SHA1

    d1df572fea4214e0c7b723d4e614143f4803dbb4

    SHA256

    4520d633e9e0a03cfe18b780bc27a3a25920f6fb11cbeb746448ca9d6653fee5

    SHA512

    068d449ae106d24d6eb923dcaa12b689c34818af3b5a9549c0881136813e548b5e6ace6fb71e96bfdf6d9dbef40082d4d99109697150d93db333f1788341291c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    196070c75b972dbf23177cef8d6fd91f

    SHA1

    748579920f8668c3029894fe6590ab80d14276a1

    SHA256

    e3dbd939f5edebdafa110c32a6563f2dd69dd4a3567191fe4ac318aba4376d36

    SHA512

    db1860a3db7b35f409a8588d7f9e295df0e317748033c8bb6701e65e6dfeb0170f4f04a772ae48ecb9348909291131806a79ede5d4d0828e710ff3a2e650e54d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5786a7cb98f51e97c0571fe314435577

    SHA1

    6d59d5ad07a6c30560515af5be8342337b5e068f

    SHA256

    caef4ac30659712847e25c50540ea1ffe4ba4a674ed1ac304d8762f680d7c7a7

    SHA512

    30fcf801a4ab71e9afed402a3ba49d5bae789b271bf7b8ca8332f40e2906f7dbb7205a09f98a4740a8701243e35b09782114b1bcffbdd696b85de1fe8937fd97

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4f3ee15bf0bd83d9bd30db4b2e85a2e2

    SHA1

    cd7d5ce38535f5b8bae7ede0bfa48bdb76815d91

    SHA256

    64954814c439fcd1dd5fd6d38707d803a7578cd0d73f1b3af929ca078e191c84

    SHA512

    e3d110cda6f5ac1ebaf3df447daf9fa387e922dbb6bf4fcd5a3bc4e347c728f90e73f2851ae529ac3c73c72a1d53399592ae5a8ba350f7dc896dbe26dc1f6176

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ff4c33e8f4f626492685f7e0078534b5

    SHA1

    833bde1d19f54420651f221a846129b9a99152ca

    SHA256

    7b9c04083d01dddfac70a3be3780005b323cf476e5ed64ff8c372f171c09cb69

    SHA512

    43ca6b28c28cd38432ce3cf70aa995c343b73c60a2f72bb8f095e9ea63f2cadb898638a0ccf4765a9756a293e6d173e8043fc215f75b5b4ec29e56aa3e493240

  • C:\Users\Admin\AppData\Local\Temp\CabFD94.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarFDA6.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\SysWOW64\rundll32mgr.exe

    Filesize

    88KB

    MD5

    fe76e62c9c90a4bea8f2c464dc867719

    SHA1

    f0935e8b6c22dea5c6e9d4127f5c10363deba541

    SHA256

    5705c47b229c893f67741480ed5e3bce60597b2bb0dd755fb1f499a23888d7d6

    SHA512

    7d6d5bfb10df493ffea7132807be417b5a283d34a1cd49042390b2b927691fd53ecf8eee459c727844395f34e4230b2cd85b38b7fb7df0a3638b244d0c3f6394

  • memory/2752-13-0x0000000000160000-0x0000000000180000-memory.dmp

    Filesize

    128KB

  • memory/2752-9-0x0000000010000000-0x0000000010026000-memory.dmp

    Filesize

    152KB

  • memory/2752-1-0x0000000010000000-0x0000000010026000-memory.dmp

    Filesize

    152KB

  • memory/2832-16-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2832-12-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2832-14-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2832-11-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2832-17-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2832-18-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2832-19-0x0000000000190000-0x0000000000191000-memory.dmp

    Filesize

    4KB

  • memory/2832-21-0x0000000000410000-0x0000000000419000-memory.dmp

    Filesize

    36KB

  • memory/2832-22-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2832-23-0x0000000000401000-0x0000000000410000-memory.dmp

    Filesize

    60KB

  • memory/2832-10-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB