Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    68s
  • max time network
    69s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2024, 06:46

General

  • Target

    c55c176537437cc973504ad7b585aaabb4f7ada225409309a994840fda2aea3b.dll

  • Size

    529KB

  • MD5

    5ddc5728af802a8f975bb6c9e3e0458b

  • SHA1

    364a65e625c8fdd05a2083c256f42587f88b6fe0

  • SHA256

    c55c176537437cc973504ad7b585aaabb4f7ada225409309a994840fda2aea3b

  • SHA512

    2cdeafa4d985ed0a2c6a6fa126034820dbb6295c17587772b98e4c27b55bcd7cc208382bc3e988e0c057c5cb45962e5db5bf3e66366c6325b96e1c891e1ad97a

  • SSDEEP

    12288:FdJHTTYNzl0/coo7N0s3VR85Lgzp3dww60dN:5HTMNW/loR0s3r5zfX

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\c55c176537437cc973504ad7b585aaabb4f7ada225409309a994840fda2aea3b.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\c55c176537437cc973504ad7b585aaabb4f7ada225409309a994840fda2aea3b.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2360
      • C:\Windows\SysWOW64\rundll32Srv.exe
        C:\Windows\SysWOW64\rundll32Srv.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2716
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2352
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2368
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:2
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:3008
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2360 -s 224
        3⤵
        • Program crash
        PID:2600

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aab4683c3f9caf0062f316628696199a

    SHA1

    af47c8ea00bd7b218d5f86ba4fb31073e16efd16

    SHA256

    c4eaf1f868ababcf583bdcfdcb686ba6d76bf9035bb48b628a0d89e3300f211b

    SHA512

    fadecd416924c4333d3acbb8ac1a9cceed27038e18be544f5cdf95386e111894e8afb297f0f36d43bd75611604ba0918b71399df21328f5a000e8072f2482eff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e0236ce6ec8ca588e670fd36cff082d0

    SHA1

    6fb571d9f603ee9e45f842d6c0c10189342c9ab8

    SHA256

    c51fcfe8e8ee3dde8780c6ef0eb88ef9518cc7fc8eba02e6c5f67f28a57c1e8e

    SHA512

    d8bcaf01afab873e055fd24c8c6b6c566df061ea7f3f0767070f288648136ff21c15354e1cc10d89a9b644621f4cd9849c09b44af6a18adfcf9e093da1f4734c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fa1a4c9d0b6bc0e4ba8457e6bb114c8d

    SHA1

    a7db9ff566626285c458407cf4ca4d6b83e4578c

    SHA256

    b7c270037cc3dfd35727ca7725b1ead3f72155234ccb1c86854eb80493157fa6

    SHA512

    757b191b20425512b935afa19c0f933b8ba296629c7a72586086570b4dfc3740fa86f72781de7ce228936c0382cc373c2a99c7ef637aeafb0e3d72e56fe8e766

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    17f4d6203669efe075d40a1f15e86d65

    SHA1

    6f14f8a85dd4486f2309ebe8e0c54d8b6c56807a

    SHA256

    36421dc45979d585c73578e1661336a3b9e7897507558d9cdfc5dc0edc4aa5ba

    SHA512

    d1ab40fdd4347250a0eac3ed9f46228c3b5f241b7882884a96c217474e0cb8f9fb4fdd0f9b7a35b04606698969cfe9fb0c84a95f8cd48998c4dbfdd38980f371

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ea798e48c310e0a214f5b699f34fb65a

    SHA1

    75ddb1ffa5312cb962a85e0c3d7d574bab62971c

    SHA256

    369c860a4df73db2b67013d194277d182e89842c11fd8a1c49d60e89cf53fc91

    SHA512

    b7a77abdc438d291cbfae22adee7baf9d4b7ae2986814ed47f1fac05707ede3a40b87884c1543858534f2239209d9c623c487d240f4b2ea88d5fc8c021dbcb82

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6b9ca9be75473d5251a7948eb7e1d937

    SHA1

    bf3029a6afe9f6d3ba719f0ba51c444270ebfcf8

    SHA256

    55aa97400dc07706319ab1dd7558fdd81c07b8e20da2ed0571b2d51b36c40fdc

    SHA512

    2ebfa5aae9b5170126ea08e4b66cb9932b02be1c0227cfdbf7ba6818eb318cb91e773b1d311c511d778a74a5cf673344d25c192d6dd38a1fe1b0d17daaf10c77

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7e16a163683980ff3ada1ee832504be5

    SHA1

    19a452280f5cfc68b54e6be3001d1ee15fa27c2b

    SHA256

    a8ae1b1b0b23f82b9ed016188c2f7f7b9a84d649c821a89ab9c39764bd8de601

    SHA512

    faa360b40d6ea49ad2e54ade24e68268d1eb2f95c227dd1572b0fa45626a3cd5f2162e6ef0dbe38c10ffc5eeb5c147d8349e20bf750cce561c8ae5dc407f9cd6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e15fcd717dcc8ba31c08cc52c051e83a

    SHA1

    87b5457fe1f7b6fb37d4f2f481296b58d022582b

    SHA256

    f294bb5ffbf50b17a82fde383a637d2382d65e8e20a70ea61556d9a0153f80ad

    SHA512

    c835508eb89df576df496ce6c1e6b5c9ce2054a441e2bbf48d2566eb38ecc1dce059424547e88c4d459bc7fb686913880b09d5f1a540d9879bcd2163aa82d7aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c788e605811820e354748819f9478e3e

    SHA1

    4808881f422d646131b3d2b33d27bd61ab96c638

    SHA256

    9554b20f7abfe548eb87a7957c4a163308416ff2b33a07c0032fa29ba050dd43

    SHA512

    56843602f3e519ccd5f26d10517a129fce83604eebe4357be58d673781ddc32713594e45b2ea60779f02adaf28b2e7e7baf16081fd48dde4586a47d6c85523c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c8421fded3c8a208e14fc64d777638ce

    SHA1

    545029274b0e2624550dedaaaaced381178947b8

    SHA256

    92e7086b5537715d0262dabf1027cb8b09a4c71930720de650016113714e8eea

    SHA512

    3b0a7846b7b7f6b221c96ed48fe47c5628b5833f1c4cd1e2e907cc930e10befd14ff9fb8de869288c4bf5d84bca2a6fbf1043d0cf7b152cadf8969b0c2f2825a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ac1df57a4e58c083c8ad16dfddb138bf

    SHA1

    b1910c2dfd49e1953ab3ed9400bd41e7d7090d4b

    SHA256

    a58393c028dea38cdd379005ededbc76a47d34ca38403f052faa1600c41f847f

    SHA512

    358b17dc1abd14a55d5bcfb64e67f6eeb5ee393ae6bff8589f4c5a2b2bae0f42b78163dd7577738de6df7208237c15bdbbe72e9892efc31ddf8f9f0f60da6a5c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5153c6cc0f8d18bfae83f7e20590e0c0

    SHA1

    8e8950fbea6be1cf9aa8a6e0683e625b71176374

    SHA256

    cb3863f8ec3a0a04cf5c8b86fc3bb1253255694323c638d1c3eaef74139e3110

    SHA512

    0feba7aa4583295723b0ec9003d0638dcf9be25ae6ccbddc917bdc1a59e9ac90c5ee75e1eace99cc3b1afde56153e628b3f7e3372399a8d62be55554d95a3d13

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    720cfec726be21c1aa9d917bdb342085

    SHA1

    4e456e255f339de27bcc91589792245ff8c5de77

    SHA256

    cf1b6390390039dcb74f6940fcf95222d4ed9c7e16b9ec865e9fef0639a7f66d

    SHA512

    6ff7ad4ae2487d4e478efab6912f77b8b5cfd06252ee3bdadb25c88e70ec676358a78d916a4c2b491bba7159345feb22b8ba673d934ff71a38225d2a0e0d5006

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    db276159409d2414617a4d5308a0ecd0

    SHA1

    5fe741e236da2b40c8983f5acd02d76d9effcd57

    SHA256

    9c1fec38a3a430927953d7c4d9cf2159b17d0b34db6928e8701345d29b183a45

    SHA512

    131a886d4ad1a5bb7335452aa72b8fd2af21c2066df6c40f59e3507f1eb6d231997e89692c6310b6cf469999301ddcb527a7238d1591a7e363461ddede32aedb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    330e683642be0cda62dc0d61a4db1587

    SHA1

    17b52a12cc4bf6335024cd3c5f87139762ef40f0

    SHA256

    24f4e18853d333b41e74abf92832721eedaff2135746cd04d94e6cead4ad494c

    SHA512

    1451802f12e17422e24437eb86c26bd2ae6e72ed577599b0abe73fc8def82d29c1e7a247b656ad99bd546b39f0def1de7945cc103e44be66daa39c561557d805

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    345ac97f49c385066fe6e8fd6784ff50

    SHA1

    e7388f77178b84efdf6deb03d76c31d5c6914cfd

    SHA256

    cfb44fead890f4c2861813a94daca395b5cd7709c04af187a1b5cc3070b30575

    SHA512

    9800be5538efbcf8faa9e81f57644ab6701e1c2d684bfedc4ffb4125f6c8f13eae17eaf3fc59891d5353aa39ecd418c3f526b83ec5526ee9beb91357253a19b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c88a4206d6e1f69d835693722e33ba21

    SHA1

    e334e78a8abcd1f1cd3946ea3a4412cf48d93843

    SHA256

    08157f70ec1c9eb6de18089ef8ba6022b679e64cb0f5adcfcc659c6e90d52e2c

    SHA512

    f37af7cff5a754561ecf62f5563be693f56a23c2de510a3656e7202b3718d56d8ca3f53e0bd203cec1f87a5fceca102a9a7a5d20356e0b1d88cd8c41397e7ca8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    15a41b24215ee37e19c1f5c0a40315c7

    SHA1

    351032397d7bfa387c293178fb8e47832c3886eb

    SHA256

    272dadae5487d8255e700e03551a03cf5ab0801deaa9a18bc734a06a9925979a

    SHA512

    972b5ae57d1b7496b261b10ea535f9049dc175fe82e3065ca9600665b965188804e265cd5945f38fa1421eca752ed7993a6b51f36be73432927e2417fd26c009

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    102eda20484196342c05eac03df9f264

    SHA1

    fe4cfff40af804eccf7c1577c21e35780d8ec5d8

    SHA256

    928ce553f9927e663f27c43c23fb44bf2005229325a8fd2e6cffd825528f3f30

    SHA512

    117ebbd4720eba4061a86afe7d6ca97082023cb18d2edecbf55aebb1c8454c40a463a00da4df335c95ff1a5a5e9a13b4c051c8267a6f27a2366104b1363d748b

  • C:\Users\Admin\AppData\Local\Temp\CabAA75.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarAB62.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Windows\SysWOW64\rundll32Srv.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/2352-22-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2352-28-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2352-25-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2352-23-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2352-26-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2360-6-0x0000000074530000-0x00000000745B8000-memory.dmp

    Filesize

    544KB

  • memory/2360-29-0x0000000074530000-0x00000000745B8000-memory.dmp

    Filesize

    544KB

  • memory/2360-458-0x0000000074530000-0x00000000745B0000-memory.dmp

    Filesize

    512KB

  • memory/2360-1-0x0000000074530000-0x00000000745B8000-memory.dmp

    Filesize

    544KB

  • memory/2360-9-0x00000000001A0000-0x00000000001CE000-memory.dmp

    Filesize

    184KB

  • memory/2360-8-0x00000000744A0000-0x0000000074528000-memory.dmp

    Filesize

    544KB

  • memory/2360-5-0x00000000744A0000-0x0000000074528000-memory.dmp

    Filesize

    544KB

  • memory/2716-21-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2716-17-0x0000000000240000-0x000000000026E000-memory.dmp

    Filesize

    184KB

  • memory/2716-13-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2716-10-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2716-11-0x0000000000230000-0x000000000023F000-memory.dmp

    Filesize

    60KB