Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    66s
  • max time network
    67s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2024, 05:11

General

  • Target

    d00b97e29b99ef8a1974e6af4ad44e02b55be008dd7167ff248ed4f7998054ceN.dll

  • Size

    124KB

  • MD5

    9ed44724c10f3a5a04658121a98389e0

  • SHA1

    7241595d5d50b3acba528406fe7c7cba94d13d2d

  • SHA256

    d00b97e29b99ef8a1974e6af4ad44e02b55be008dd7167ff248ed4f7998054ce

  • SHA512

    e36413887b8a415c32d7014559208c648c49d0db6cafa9d477ccf52c638cf8922846b5c5029ee55ebedacbd00f0e2ff171be29ef22529e1a3f6bdc9fda8de448

  • SSDEEP

    3072:gj6tLWNhkRM7VmKeZ88Dkj7oR2SqwKJXtf5DGyVBQwIY6X44:gTcvZNDkYR2SqwK/AyVBQ9RI4

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\d00b97e29b99ef8a1974e6af4ad44e02b55be008dd7167ff248ed4f7998054ceN.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2708
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\d00b97e29b99ef8a1974e6af4ad44e02b55be008dd7167ff248ed4f7998054ceN.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2744
      • C:\Windows\SysWOW64\rundll32mgr.exe
        C:\Windows\SysWOW64\rundll32mgr.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:2944
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2780
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2780 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2556

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    25ea5185d7ed1d15491c43d6b7b44c50

    SHA1

    e65c0732d783a2f0de8464eb9c876fb332bf7ec9

    SHA256

    a19babd6898408d7e12405a87b6af6051759a8f5378c1b32090c7292f185cee8

    SHA512

    abfc02da9db007d6e6818552a593ceca1ae2f2f7230e5907df77467d62f2399ab78603acc0ad01cf5badc2d8c01d30ba6cf24f7d53a4d8f33d6e362eb0551657

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2c0399820469a7e7e6e3db38b311f30c

    SHA1

    0e72537c6dd265bf8f59509dcba86ed111779a09

    SHA256

    4da431d1e0f5e7289709d8ab1c0cbe3a9eebe0bfe349f51be40bdc38192cbd56

    SHA512

    9e2cced8dd29c7722472e4f6e51a7c8e66a80e4c7dbd639d92a9a5ddd3747c12e94db6c2886c107169b28169fa9427fbdb01fb219c35a5b7c89a41a042ea9889

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1574e6f62a3311c682b0e0c46da841df

    SHA1

    a811c6a59414a2c07ce5a0dae73990090f975000

    SHA256

    6fcd5e0d9f346a9d9c8d50c804e92518392a49e6c0cb721d5b37018380c9ec33

    SHA512

    acfe169b8092a79595d1cc3ad2c3e58c670b0ec6a8612247a416d28f1a837ecddbe0abb26236e147639aa06da8534a7778aebd092045ec80f001c4014560ae56

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ad5fdb6819676948a3e8a9528a9ed6e0

    SHA1

    3e5c06a528f0f1fc33224b697003710606ab3fac

    SHA256

    d71ae0df7d5e0082142ac599612c4fbe6b61182378aae3412928f8afe1f93155

    SHA512

    dc7bbabbb03fd92eb48ab4020529e063578a679b31f882196a403162818decdf3c103181fd41595d7b3cb4ea3192d67197901e024a17001229ecdf6bf22515f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cdc4c4f0e6c1e760e42fe3d4c04717a0

    SHA1

    bead4342999d4574ba93602f2c06226f4277ef9d

    SHA256

    8d2388f90517ae2be8daebe0d92a809427117cb25d5eb276b345128b84a83774

    SHA512

    3e0d6b09c8a63dd0583c8b65913a32491a54ebb0af67fde39b785aeceb10f5530930bd1572ed12d001455ea2d45edab59d2065632ef91601d4849761b004af2c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1353564e8bb7be36c6180b3011c83083

    SHA1

    8d7593f9ee15e4295707629b8ec5f2c5039290d9

    SHA256

    cbb7fb3a54374bf64bdd944286530581607c0ca409d1b44f5f8b083074835a29

    SHA512

    7add01dddaa0267e6c138b38fec90fc0f9e754a5dc985b3ffc6741f473d1108b18d2c710316ab10d545eaddbb9ac3f91bed085f7924add60c7bbaeba2d4021ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a5217d749542dbf8cbfa9f8f9cd405b6

    SHA1

    6db3e5f85137d7b9a1ec9bf22f4c376ab6e4cb24

    SHA256

    6cfc40cd254c415f70b0e5ad1ca33ba53e119c28ccb41c0bc9ad9840b3c9d262

    SHA512

    7b814f62d6a1226c826fdafa079e7a62e89dab338e3b61da35cde5c273a8c61b4262f122343858b0b7a6d2a3f490084364813d4924d4fa8b5a826c926abc39c6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a1d052f949dcf36f21668668cef069aa

    SHA1

    a4b71808327922b2dcd0046a95395be3e04d7d2a

    SHA256

    54d06a576e5396ae4834e15de07185223807791611c5da55409ed639bccad561

    SHA512

    b2e1baa76267e9db3323ddcae5344af3190abea774b41c9b9aeb69e50ce2e8c07c70f8c8bb7f79aad2e49381f8cbcf06f3bb5976009956be1351c5e85a4f845f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cb5f2ca809ce28cbb3eb34e5c023a253

    SHA1

    a74b28d18dd3f5944353a6047bdc8682b883ba53

    SHA256

    aebe86276a10230d99c9157861991b9f6b9ba826bd816e69efd122b258f07acd

    SHA512

    7de4c67e6dbb53ff366c086e0796d433c865e719e47df3e34df9537ddca77b921915b680412f039e80b84f17a0229c528c09a2702c8129b026656b73df81dcd2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2a7930a513e815fd8e94dc811621c92c

    SHA1

    2835101220b53e03c4b108bf856946605ad7fa32

    SHA256

    3fe354aa06e27d1df50777096635a5bd876a9374f8e0803b5fb2d2530a28a37e

    SHA512

    834f55cf3c2d70af69b6539c6d269600d943312dc7503b7b43f3d0c220ee854c828243c13ea29162092e4551fcefbbd623e2c35d34143248cb23904c3f468f60

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6220a3bb6bd5472cc7c1feea395ee129

    SHA1

    88c9cd52429062e33088294ffd0c2157c884457c

    SHA256

    b93c85b17afb15e2257012ddf63c8a5380786bd1e20f868409d4e2a66b9079dd

    SHA512

    d6d1af8c89c04c9fd99746eb04e74f933ca9b008f6f9b2ad2f2702727d18c4f704997470d7759a5efc513e17820ac4e9ef53ee6856dbb96864914a008057b7a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4319e05ab8eefb09e31ebc643af19b51

    SHA1

    d2c3bb1a650da57aa515354383ef6c198b318578

    SHA256

    d982117e757025bf55ce84b069f8e52bd6bfbfaeb500b7d5d55877535c3972ff

    SHA512

    48eb3e489aecbb7c6dc81ca429508a763a7dbd28bc7222a9b7a7814fbbfed9f7aa8dd1e31490854ba2ea38fb7817da377a6086d303df514cf674817ef7a21fc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1b640743e4da6a942d3f0efa5fa0cdb1

    SHA1

    6b9cde5570d2d46c88b9ebd0083f3f1509e73bc0

    SHA256

    09446784d13db8700da25ca38b07951f7c69d0c7176da9922c136259f1518a82

    SHA512

    9772aceb815523a43f43a5468538e74c17e4ec20b9029967db797fef00131aad8d6d36755bb45df87ff0bd14a818fe5168f6f4b105d84b971cbb5616ab1c480c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2d47a417c5acf7d9c52440a8e3985091

    SHA1

    5951e39ac998bb46fe29923f76a3ce515faa8611

    SHA256

    92b7723ee27b2d314fd5b524c5a9f1ed208cf2f966f9bb2e38d7143cc14d2dd2

    SHA512

    4e0b721743d9e18566184c787d22cb169e8865193b4d02203a3c8074e3a82313ad4cbc5b2577da4d2c03981554b715a0723475eee976a02bfd7d9fea49b4193a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    db93f5fc6d402265202fbb2877e3361a

    SHA1

    469d85289670b1a7858e1a9e8ae44a995a5d4d66

    SHA256

    d181e18161b1c98d5d68581911cb87c9bd653f16535351ab09c31ae6696cdc97

    SHA512

    5490044f8692539943942e296048061e429607ce870c9fa02317860dbbd9a2a92c9c2cc8c5516217d9d03a5a69964fc4a71e1b209261af4e1f40617df8689d8b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    178a70f372553bd7722fe3191532a453

    SHA1

    0f42555a07ac481a28f316f33be58bf141aa0363

    SHA256

    b78e41736ba133ccf58448c80e2d0a0e55efac31e8e751e990c898f47c2cf191

    SHA512

    422955f8c1251de03644735c6b9ab292b271d562f4442a17fb994f646ea5ffd5d5ca0fba7fc26394ce05f177bb4795611ef38abc9ce0ca98031b044aba0db110

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cc927d71b124331f40595ea3afa2e9ec

    SHA1

    97ad32b67209ce924347c8dec461e866c8d2769c

    SHA256

    7ab29fe0dd4db299f9bd98af2a878d93a81323e611d8b1b53a7e6541e813679d

    SHA512

    b7cfed3d86346ae86f4ba8324d5bbc18b69fc614958bf45098b2fa61e8cca64a8c4b1da994cb6f5ae4a6ccfa380a1149920097a679350099c048d7c9e5aeff5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    04b7022477514f6cd8d647758681d263

    SHA1

    e83dad6a0c05a203d976e17fc93dc7521f638986

    SHA256

    0d19eba8068ee9948a76c399377c80e10e05a5eeb78b55f3e8b90dcb0156994a

    SHA512

    91376695d730804fe48a2d0621b9f3e2c8bfa262c366885c413b6bd0c5a04d89aeea9c3b5f3dc3b0e573faf2d088cb4a41cb75b89490f164fb9b1be44e9a61c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7a28739704f3471bbbdf29eee129af71

    SHA1

    085ce03cd097603ae7ec1a8d01acdfea5b015100

    SHA256

    beaa5267e962d9dcca99e20dbd2ebb7104de5ad161ceec69d64b21e6718de0d0

    SHA512

    f841b5ee6b87ca82eb7cfc793dabde88baebecc6c0eb09cbda06f52de7451cd34360dc92509e262d31ca5bb04eba7a91d3b08bbba2206ed30c6c4311037f9ea7

  • C:\Users\Admin\AppData\Local\Temp\Cab6A89.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar6AE9.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\SysWOW64\rundll32mgr.exe

    Filesize

    88KB

    MD5

    fe76e62c9c90a4bea8f2c464dc867719

    SHA1

    f0935e8b6c22dea5c6e9d4127f5c10363deba541

    SHA256

    5705c47b229c893f67741480ed5e3bce60597b2bb0dd755fb1f499a23888d7d6

    SHA512

    7d6d5bfb10df493ffea7132807be417b5a283d34a1cd49042390b2b927691fd53ecf8eee459c727844395f34e4230b2cd85b38b7fb7df0a3638b244d0c3f6394

  • memory/2744-17-0x0000000000910000-0x0000000000930000-memory.dmp

    Filesize

    128KB

  • memory/2744-3-0x0000000010000000-0x000000001001F000-memory.dmp

    Filesize

    124KB

  • memory/2744-4-0x0000000010000000-0x000000001001F000-memory.dmp

    Filesize

    124KB

  • memory/2744-7-0x0000000000910000-0x0000000000930000-memory.dmp

    Filesize

    128KB

  • memory/2744-0-0x0000000010000000-0x000000001001F000-memory.dmp

    Filesize

    124KB

  • memory/2744-1-0x0000000010000000-0x000000001001F000-memory.dmp

    Filesize

    124KB

  • memory/2944-18-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2944-15-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2944-19-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB

  • memory/2944-20-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2944-21-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2944-25-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2944-22-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2944-23-0x00000000003E0000-0x00000000003E1000-memory.dmp

    Filesize

    4KB

  • memory/2944-24-0x000000007776F000-0x0000000077770000-memory.dmp

    Filesize

    4KB

  • memory/2944-16-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2944-14-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2944-13-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB