Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    68s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2024, 21:49

General

  • Target

    12b9c40313cff3a5272d2106d4d0ca2cc5b61bdb4c0468aef430f22f981fd6d0.dll

  • Size

    96KB

  • MD5

    b599cf4feae6f9092657a7eb9c476235

  • SHA1

    15201d1cf2436de0cfd8fe763599cc8ce9145a29

  • SHA256

    12b9c40313cff3a5272d2106d4d0ca2cc5b61bdb4c0468aef430f22f981fd6d0

  • SHA512

    cba247b98c72614de1fa667ad8dc8d02b5cac1cd37dec557f2d2f1976f0302f482ac7529cd9e9e587d2b4e3c51eaa78c0dbbfed53ae190e83773299dda1fe7e0

  • SSDEEP

    3072:5ibTTp78CcvIXh0VcUj4We62GIqPM0Epa:KT14RVcUj4XdGIcz

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\12b9c40313cff3a5272d2106d4d0ca2cc5b61bdb4c0468aef430f22f981fd6d0.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2948
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\12b9c40313cff3a5272d2106d4d0ca2cc5b61bdb4c0468aef430f22f981fd6d0.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2988
      • C:\Windows\SysWOW64\rundll32Srv.exe
        C:\Windows\SysWOW64\rundll32Srv.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1968
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2520
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2872
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:2
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:1036
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2988 -s 224
        3⤵
        • Program crash
        PID:2492

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f0c5d3467dd4a5fdaebb656de35754ec

    SHA1

    8ff4dd374e8ab3e7613bfe281bbec621566c680c

    SHA256

    f4b9024c59f00fbe53dcf007c934bc081e3f8e0196e9347ae007270825478fbc

    SHA512

    327190d549100bfbf46c0d4745f5836c2e6306180caa4309749cb644d684ae4ceedfd88e98c7ae260abb1fd6439198935f21acabf4c11badf9e68b16e695e17c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    427544cd5d2155a096b3ba0027c3b8f5

    SHA1

    b9595a18bb085f6ffee91c00a2264f365147d8a5

    SHA256

    51dabec53c1973718d05d9a221bfaef3c3ccd6ccbf419a66573c56557808c8d3

    SHA512

    bf1261143627c1ecd0d04c8ec91c53bb7cbd662c73f7af896ae2b54f9b42131489f89f61910b989d9036024af004ad7295069f7822883e5666560d7df728dabc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ad9f38b67482dc71c45ef8152787c2a3

    SHA1

    3949e36a0e60a1ab815564603f1bc2268b6ded26

    SHA256

    3f5d9782f5ac8aba02ba223462460804e95d3951e40c2db7bbb897305683740d

    SHA512

    f453712ab0545e80ae140483084f49bd14b29a87dca7f2978d2ebe94dc9c56b1601e08f1456f8d71f7acb3d87dc4d7f0fee9453a130c748ba7835c9d1d10e3b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5f6f27ff73d5718c2c8f79294eb7b820

    SHA1

    f186b4fa76f20d8570c4dc89a2cd449fc7f3d126

    SHA256

    4653ea24520c324d916e6b67e8a44866921a46d083f420ba5fb84245a1847771

    SHA512

    df6e533460fe7f7ac45779ab559d52d4d2943cc123d87e69829f945866243027ff9541047b7144b7917a11c079fe0c9813c4ec63fea5f8dc296481eb6e87d050

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2280200b99bcdb578324e51095e8c5e2

    SHA1

    388956c05da44df3ddeba5a64d73d6b66c84c45c

    SHA256

    0e3750c31713e4126fc07991199ddc07ae76a1a3d392aad3bcb89058f872e240

    SHA512

    9b16b70f4cbfa20bce71d2e486ffab57e5c7517c45632b4338f1718cd99219ccf9e7bd5ac26d88af600323b811ab8105249b5b7a13f61c80056400509ada3faf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bba2a476f76639f09f5b9cf2f6329bf8

    SHA1

    9432db48c0e01d8cfe7f534a7f85e3edd86e0523

    SHA256

    d1a18f0ae9ec47f11d5539a3292ca37cca2588c8e4c9fcad950e328479b5d930

    SHA512

    c85030eeb234b15a00313fcefec2d6af00d372c1369efbf60d66279f44359c622da937cd59e9245cc41197beded1a0273852f9f6fc5b1e76434406f5a010fbde

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1e7abfa6ba3e8d36a564598a3ca1ae88

    SHA1

    2263f6e330d43b091bf9a696f5cf15b5720f1d28

    SHA256

    c1018d29d18b5c77c3fc05dc3d0ea99b1aff3e78219e592bce858cb6016fdd1b

    SHA512

    6bbb233a6359df3424338132c579f868f8925547b792b6a981d47b14c5b6cb48597d68a27220118e29bb3c59c106e5f18a1c86be69b5ba65661b3b7af41437c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6eaa477ae4e888968252d8fa3f428ed1

    SHA1

    a4cc53901249d0dae44ce3ad8648d55123b35c51

    SHA256

    78cc70c0de22b4b8254751f0f4e97074068bdf2611a15716e8d6bbda380d27e8

    SHA512

    67af22f3b9955b38d0c562de130dc8ed76d98241658edf84ae160a53dd8e1e1291a079a70a34af2b9cfe6dcf3847386c85a1b3a06ee40731385c56a9509a1f11

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b3a766f0ea45dabccbec9bf6d8aa367f

    SHA1

    3937fb0de2e89c9894209fae6f37058552e1269a

    SHA256

    aeb7796553b2157cb981a13bb30ea8d3cf1d5843b78963dcdb357197cd56298e

    SHA512

    f3b3e8d5f40f670a39562bfc2cfd5a926c912eb0ff3798d73d9f56716d064c08b26b9f1157cf4305882aff43846be98274d4353438c1f0dd15aaae9b39d192af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    df0e282a2f4c9bdfd8174d119f7b64f4

    SHA1

    8b9c76ef8aeca3a8e361eb9c77ea69e4e87e42a5

    SHA256

    8bae9bfd935ef29ad35f7b47bf3cea9787c2e818080cc6141f22725c0d5b527b

    SHA512

    434a6add2ad3e00d6c2f66c9737e04e8aed12d28d4afc7e04a5f7852b6c08b9c54dce2a25993c3d1da19fd6c1f9d6526080acb7f6821db119c3d99561fe21683

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    29259b054fd93c7bc7de71d92a8ada52

    SHA1

    1911d29fb14ab057ad0c2c1909fdf7c0d0af2f12

    SHA256

    a80a1fbf81ea22ee1a3636da7fd25300c62cc0bc2adf6a875a2ed8dfd234e0dc

    SHA512

    c40b22d2633eba4025990908bcf3dd811f6d0536902e556086144098b7fe8fcbe0b4f685dde269cacb6fca11410fbb95e0f8251c433bac9cd44b1c4c645563fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a590b7c74f8544a06f9ce76848834c3e

    SHA1

    c4bad599405c2f248ab9fb32c21b24b5a7bc97f7

    SHA256

    b420c3d541d7a3cf78e30227f85863c1c9b75b753757f08fbe87fc456f1c9539

    SHA512

    4fdfef06dd856214098eee3ba6fda00b3510d2b85102cf2379691fa079824e56bc0631109889e0028f1264971cb8dd0a77c1c6032e56d5e115796440f1d12de5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    96b88508c56a330d80edb426814183ab

    SHA1

    8fb89aa06cf51ba0c76df86b28f9276405121772

    SHA256

    48157c2325bccd3866eab31d93a6203173e008f4a50560ab3643f79f8d3d1169

    SHA512

    59a3b823efab4ec51b0544abe244541c405366c972ec2b18d9c2608175baf97744da4bf2cede5a859edb653608df66840a9f4368794acc09c9805985df038ee2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    84b3f58a0bbfecd0b2c5fbc004c3dc54

    SHA1

    1958928e2f7f41bf8e05920d4e6b0e5d77e6c622

    SHA256

    a6eca0d4434ddfe97937ff969b32df645018697bfbff37271ac5d0333bc35099

    SHA512

    995ac399713c982d136ea298822f3be5c75b6249d1f79a215cb0c70c910375377b2cfa1f573e26367c1a187171735753925708fe31f2195eb69ad7f4334ae58d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a2e28f3cb5560b0d820d9a9d9a32dcec

    SHA1

    42163fe650acf3f5ad786876d631f7d59d177a28

    SHA256

    bdf00db69025b58fce51a643df18bbca0dc4ca024c817737b65f429a70a4b320

    SHA512

    feaf854420c16acb1b14d4ec8b48555d385b8c9859d67f37ef7ae56c45499e65fe1f8a84bc9810ec3ca0849ceae4e0e35cf971845c00e17b1695ffdbe67ab5c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7b6645374661eaea90cbc9d6de7b8a0d

    SHA1

    6929c503e6c6fe893ce682a31d58aa21b749c563

    SHA256

    6ba7b7b1557d8e874aa1ef5f23e3350dfd0d9707c7d75d030ec3ba8f5596faa8

    SHA512

    f88a9300dbc3f2aa7748040b90c8443f45b83a94e49054dedb93d76300946b9cfb828ebd8d2ca132e0752c7d661e4aa68b2baef58d2b783e3b059dafe4123ddc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    714dce05c55e423cb7c34bc96710087b

    SHA1

    7a6c6c71ae06c18aec95fae320416f4ae13e3565

    SHA256

    3407ec29e30bb1998b385fe71bb1d00c63e622a207c4a30dc7061cb639aaa380

    SHA512

    48e70f7c02a9ad001aacf79c099450d65f73a95b9ab2ee38c6f923c58ea5d0cefcd9f11dd0de2351462629dcdf72347556ae40b96be5d368aedfbb77056818bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7e8dfbe357adb20e6537c1bb5f4e0ef5

    SHA1

    dfbac99554ea0c3a3aa960fc4564bb40f52899b7

    SHA256

    2bd172dd58707ea5aa3ee31e56bfab416e32ee829819bd6d1bad19e75be76f9d

    SHA512

    85a5af59fc40f15212802de318f63941efe1802050237edc81ddaaafb0fbba7b92a78aa7d58aa6c2a66ed7cd4de06b475c33b15e3252ad07d20f4a2bb0b9e595

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    32cd5a46f7a16ed5a98b5d1a30e83a2b

    SHA1

    a1aba0ca5d8aa51fe53932e63aa0c2509152f6ed

    SHA256

    d655506620405e71545d61f679633cfd2aafb0b18e4c16ef09df4e148366d3e6

    SHA512

    0d73a5ec4be3b7376ab6706edfef74f1558b557ef134bce4540016afa39e393fbd08dc445b9b93dc4cd180dc145602a0e7d8e6239ae8416629e27f38cc4e3794

  • C:\Users\Admin\AppData\Local\Temp\CabD08B.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD169.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Windows\SysWOW64\rundll32Srv.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/1968-10-0x0000000000230000-0x000000000023F000-memory.dmp

    Filesize

    60KB

  • memory/1968-11-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1968-8-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2520-18-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2520-21-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2520-24-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2520-22-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2988-1-0x000000006D080000-0x000000006D098000-memory.dmp

    Filesize

    96KB

  • memory/2988-2-0x000000006D080000-0x000000006D098000-memory.dmp

    Filesize

    96KB

  • memory/2988-20-0x000000006D080000-0x000000006D098000-memory.dmp

    Filesize

    96KB

  • memory/2988-6-0x0000000000170000-0x000000000019E000-memory.dmp

    Filesize

    184KB