Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2024, 20:06

General

  • Target

    bc9c0e0ebbf2f2f0e5ce6b2907504ecabf46145d1159809d742de6dcaed29dcf.dll

  • Size

    124KB

  • MD5

    daa45d7612ba5c09af73723ae271f68f

  • SHA1

    20083b1389814ca8f109a87e0bf0add7712b9903

  • SHA256

    bc9c0e0ebbf2f2f0e5ce6b2907504ecabf46145d1159809d742de6dcaed29dcf

  • SHA512

    64eb399d2b5b85745568b1834afc5c1f1f91e5283726f7ae671484730a5fc17f8f72c90fe2ed7fe9d72aaf25d96616e27b8d4591858155cc6d560699464bf249

  • SSDEEP

    3072:Sjul6/5M7VmKeZ88Dkj7oR2SqwKJXtf5DGyVBQwIY6X4N:SocvZNDkYR2SqwK/AyVBQ9RIN

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\bc9c0e0ebbf2f2f0e5ce6b2907504ecabf46145d1159809d742de6dcaed29dcf.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\bc9c0e0ebbf2f2f0e5ce6b2907504ecabf46145d1159809d742de6dcaed29dcf.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1280
      • C:\Windows\SysWOW64\rundll32mgr.exe
        C:\Windows\SysWOW64\rundll32mgr.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:2304
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2820
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2820 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    657ea7f1aae90c9609571559ff0f4710

    SHA1

    cf2d654c1df54e092c5cd9da0a285dc40fb640e9

    SHA256

    8d563ebc56e7a4cf11e716db0b9dc86e47c9d6699adb562941eff0f85347935e

    SHA512

    3dbbeb681d28c509d96e16519da0402539b564ce8ef9716dba58221aa16e5708f42e1f3fae082a5f17e565f15a2a38d000b78cc8fda277636ec1dc12a48341ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b6139d2c81d427f7de0c26e15bda2e1f

    SHA1

    873304c6c23c1ffaecb47cde096ff05b75a07948

    SHA256

    0d9ca455a1a7eececf2245e4bb5412555d807a313587cff42531f026840094d3

    SHA512

    122eae3d38d998ccc71cb0f3d1d6e0fdc7b5b4d73104aa7985f84b72b191d6653d3c19668c2e3fc9cafe126c11c4bcc9bab139afea50cf5f868e6665820dbb98

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    820417b365308b3602311102e4f259bd

    SHA1

    37f417da42aec05917a75e20c70393095843d4fd

    SHA256

    476c971eb462d66f6af19168ca56cb9104b7e7c86b096f7f77e9e27ac16e64cd

    SHA512

    351e0dbaf8690b68c9cb3261af3a0d7c846edafea0aec6c8f873e4604a47e0535ef159bf7be51565d67dbb432d1559774e30b7d503b4c004ab946432ffb6b06d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    732aad48cfc3a1371d2255dbfa8e0597

    SHA1

    2b09ae9ba6f8856c0422090dcaf46c144d909701

    SHA256

    9e731b4639633c143bbc93dd92ec27870fa450d0e52b12998cecaa39330a6af2

    SHA512

    e03afe98305cee2d7fccccac45059765004996b305f2bc9485c5f30e80fb44b6576ebe0035b6d68f1ee1cf992f68f4433e538877e476f00527718cbfb801406c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0fc93e0e1a2e031b8194e019224215b2

    SHA1

    c6dfb09baab8db9e732670d8b844cfbbab0b5447

    SHA256

    69eea11f4641731e4114dae40457d2c7585e897581ea60959e3955f8171fd9ac

    SHA512

    e35d135eb9ec6ab0678a619f31c1d9fd6ba42a77b0f7c1df366fadea53b4faa7480ae3e3a4c7b488e06940029bbcd6fa108e5e324f0b6bacbc837dd8a888cad0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cf340879622e0f89a8a1c7b71b30ca4b

    SHA1

    abb96a91afe192f76dc2a61df01665d4f4b8655a

    SHA256

    2b9376b2ad55e93cd4603549bf1135ca80f90e1160861eefdf6adeb1cee0be14

    SHA512

    f0ccdcfe4cbd384fa478e1982a2025f0702ea265aa3652019f856179e8dcbdfa1b65b18f42f8ee013150fb945720d7e1285eb8028a742e1eedaffdbcf0d0ffb8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    851e146b2c22c3dad8afc5571a226187

    SHA1

    d1c30069a2011233d73ddba1e63b8003f815e66d

    SHA256

    75e6d73296d2c29de4118132d4fbc1ddcd84dfff4867f16e2b129cfefbaeae6b

    SHA512

    c0b88a70eb48cc4598dffcbda46dededa4281387aeed1eefcd6f8fcc48963b5787cf0122cf185206f6339cbe2aa63657d6d52f0426acf1f790e7a7172541bee4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5f0b8429cf8c8c6a9b9ee1f77259f748

    SHA1

    de8f49aff30522b11e1e290a8f0414bdef8daa18

    SHA256

    70bd814739e1de555ea3806ba1314fe102f8578f2caa5ef551a889577189654d

    SHA512

    c02c719b0aa6a22e29a1b3ddbc73c5c5ccd657e68f1905c64454b258aaf2a41041daad560b44b42bae98252a8d85a0c272cef09f2a72f3d26d9454e5890ca7e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    272a8d1e4860de0ff2d8a7fe57ffcd9c

    SHA1

    4ae109a2c156066c5d9bda7f962437aaef79290a

    SHA256

    be68a9bee75860329cddbab94deb72468995d26140e930b22e3b21e5a6a6ade2

    SHA512

    248254b1667837a240d8d642999c311e5a369152194ce51d6ea5f4147449a000b9e9bc3ae3040460c7328dbdbd04939eab5de92a9627314126dc61f10f32041a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    61ac9aca24d1cb96fec7081d767c4a9d

    SHA1

    078bf0b88402a18996a5bd9076e22697b2171e67

    SHA256

    5fd818fe5d06f365b1ec002a5d77618d1d2aedda771b7634dcb4f5fb5cec0b6a

    SHA512

    51a6e9ce1ab6966b046e9b3cfa27d9e9e5f68519855102c1383a382bc8194900539c1f5a25d9ab5b6a4b7bfbb424b3449b6b3cbc3de18630483d354be42bd121

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    664bdf465ca55c00d0a281838c3a3e2c

    SHA1

    bd9904df0dbcb4166db2180e25c7d2a8e02cc76a

    SHA256

    4f6f32a9bcf2f4e3d7121f01828855511cc87b6e7e847c49e1dd24ace59686da

    SHA512

    00880e49bcb1b4f6d85908f52a9a7e8fd4c8d31866b489c2e573315cbc17c325738fa665c8eb3960b4f0ce3f9d075ad1078bcf52397f07b3b76fc7261410ad19

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8e5ebfc6573ab65fd18de32231632684

    SHA1

    20282c48191967066f57ddb283d11c69f4cf7ddb

    SHA256

    146fc952a8d237063baae19bf8d8965511fd1ea9cae24c14476d54c34e8c9d1b

    SHA512

    74e1748a04909a00339e258daf0f59500f65f0619a61a5d4ab8a37fd75a9b7670710298987233328c27dea2f83a657cf3678beaa32306c2ccc01ed1e639e5f18

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    da772c777e5f47cf6a1aeb1a9645da6e

    SHA1

    32b9ff68d4cf7018c2ad49be99e1574f9066346f

    SHA256

    cf1de6051e729702db80433cf793fdf25f41d3acba1da363a13ca6263d1f119d

    SHA512

    bf8943d22d67e14dd530329ccb33e95c27bd528a4d61f32953250083ef91307688eb8aed0a1cd567fc343405a2102fefb779d8f05ac23951dfc8ada92d469136

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    39af37847292d6d54985d90c1959619b

    SHA1

    eadb99792f593d547651378349e68be461114bca

    SHA256

    3a20b3b9739a494c76850ed2a9477d86a69123d52c72f097f9d1aa0e6cbe87de

    SHA512

    beff98eb8c7b0dd73b4e7b298a8a8e29de363d426d2494855cdecc302245443eedc05b6586e65fa551f865d8b4b79ae49de6dc9bc2b0ce10d897b0afde130f67

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f8eaf63d82345800847e5c6a211065b6

    SHA1

    a0d0ef11e2778446af89a215cdab27a8f406133d

    SHA256

    f54edfd5b7758fb076f5c9f79d03eaf02e2bdc3e162cd7a2bde2dea97b4497ea

    SHA512

    20df94a8c44752214847f7dd2723d1c86167b7e392e04acdef9f4b8da262a45fa8762d86aa8ba904daa000082450a43ac6ee49023efebd549435060a873bd0d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e471d14029d0e84c720f24c9fb64182c

    SHA1

    a8cc851408819ebef727c0349ca5e01428683465

    SHA256

    d839368dec25ac1e86a3e1f4445211689c63103e4473daa03a7141c5597eb2fe

    SHA512

    d4afd3618eaa390061947fc9f18e5f7144ee82490a2b0ffe419162f0d841adb894a07211e3c2fd5793e8ab340b0abd7e20a0b1651b78eec93ba5b68cd0ce128d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3dae0facfb3eddf31f45b434a64328d5

    SHA1

    b5f39e6f6b3fd61c4473498489e2438694095a63

    SHA256

    06ee761715ee4d3515e31272c7027f252df02882d25ce5fc37c7224a20fe6e8c

    SHA512

    531746ae91f7cb0f7410f70d2c3fc8dc1ec317a23acf6be3cb6d73ef36a0b27bd4d93e6b984609ed3315be79eda4033ff9e1ef8d58a1f91c7e924e3778f03639

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    37e2c253878927dc2db1313632521f0d

    SHA1

    b4a32e10a4241a8848d18a1618e28c3bf28d4d18

    SHA256

    461f537b6e8ed84caafaba158f880102b000cd8b4f8e51114bec42d200dfaa5f

    SHA512

    6777d2bd6f62646bb73533bca35398766f7e45193744ece714acc53e1501ab4b48d40c1a84f8cb1677693f24c4ecce2aef9902bf7e54dc3244c365c3e69200e5

  • C:\Users\Admin\AppData\Local\Temp\CabF07A.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarF157.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\SysWOW64\rundll32mgr.exe

    Filesize

    88KB

    MD5

    fe76e62c9c90a4bea8f2c464dc867719

    SHA1

    f0935e8b6c22dea5c6e9d4127f5c10363deba541

    SHA256

    5705c47b229c893f67741480ed5e3bce60597b2bb0dd755fb1f499a23888d7d6

    SHA512

    7d6d5bfb10df493ffea7132807be417b5a283d34a1cd49042390b2b927691fd53ecf8eee459c727844395f34e4230b2cd85b38b7fb7df0a3638b244d0c3f6394

  • memory/1280-2-0x0000000010000000-0x000000001001F000-memory.dmp

    Filesize

    124KB

  • memory/1280-1-0x0000000010000000-0x000000001001F000-memory.dmp

    Filesize

    124KB

  • memory/1280-9-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2304-17-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2304-16-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB

  • memory/2304-14-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2304-18-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2304-21-0x0000000000050000-0x0000000000051000-memory.dmp

    Filesize

    4KB

  • memory/2304-22-0x000000007793F000-0x0000000077940000-memory.dmp

    Filesize

    4KB

  • memory/2304-19-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2304-15-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2304-13-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2304-12-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2304-11-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB