Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2024, 21:22 UTC

General

  • Target

    39f2cb8d6335165a641feb409e011be2ea6e44132c32b2e3830c1e7c906a8dce.dll

  • Size

    220KB

  • MD5

    608b6a2d8da0e13d53f69b4221b1ae48

  • SHA1

    6699e1a674a9d755ac8f852b8ba32dd1b0fce78c

  • SHA256

    39f2cb8d6335165a641feb409e011be2ea6e44132c32b2e3830c1e7c906a8dce

  • SHA512

    80e0a66fed1f8afcc9b85e006987cc1de030e11e8d47f9e9578f2a6575c1c50a9ac969a98233eb5e1912b70c1d0ba0dd9ec6b849bbe2a55e0ab1a38d84f96ea4

  • SSDEEP

    3072:gn2Pxxtd3PQLBvBt0M1qCWzJP0ruTTBaClHpspom7ffrAmpV:oS4LBf0dJ5TTBZbspom7bXD

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: MapViewOfSection 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\wininit.exe
    wininit.exe
    1⤵
      PID:380
      • C:\Windows\system32\services.exe
        C:\Windows\system32\services.exe
        2⤵
          PID:476
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k DcomLaunch
            3⤵
              PID:596
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                4⤵
                  PID:1220
                • C:\Windows\system32\wbem\wmiprvse.exe
                  C:\Windows\system32\wbem\wmiprvse.exe
                  4⤵
                    PID:892
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k RPCSS
                  3⤵
                    PID:676
                  • C:\Windows\System32\svchost.exe
                    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
                    3⤵
                      PID:748
                    • C:\Windows\System32\svchost.exe
                      C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
                      3⤵
                        PID:812
                        • C:\Windows\system32\Dwm.exe
                          "C:\Windows\system32\Dwm.exe"
                          4⤵
                            PID:1064
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k netsvcs
                          3⤵
                            PID:856
                            • \\?\C:\Windows\system32\wbem\WMIADAP.EXE
                              wmiadap.exe /F /T /R
                              4⤵
                                PID:2332
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalService
                              3⤵
                                PID:976
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k NetworkService
                                3⤵
                                  PID:236
                                • C:\Windows\System32\spoolsv.exe
                                  C:\Windows\System32\spoolsv.exe
                                  3⤵
                                    PID:1084
                                  • C:\Windows\system32\taskhost.exe
                                    "taskhost.exe"
                                    3⤵
                                      PID:1092
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
                                      3⤵
                                        PID:1176
                                      • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
                                        "C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"
                                        3⤵
                                          PID:1564
                                        • C:\Windows\system32\svchost.exe
                                          C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
                                          3⤵
                                            PID:2008
                                          • C:\Windows\system32\sppsvc.exe
                                            C:\Windows\system32\sppsvc.exe
                                            3⤵
                                              PID:2100
                                          • C:\Windows\system32\lsass.exe
                                            C:\Windows\system32\lsass.exe
                                            2⤵
                                              PID:484
                                            • C:\Windows\system32\lsm.exe
                                              C:\Windows\system32\lsm.exe
                                              2⤵
                                                PID:492
                                            • C:\Windows\system32\csrss.exe
                                              %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
                                              1⤵
                                                PID:388
                                              • C:\Windows\system32\winlogon.exe
                                                winlogon.exe
                                                1⤵
                                                  PID:428
                                                • C:\Windows\Explorer.EXE
                                                  C:\Windows\Explorer.EXE
                                                  1⤵
                                                    PID:1148
                                                    • C:\Windows\system32\rundll32.exe
                                                      rundll32.exe C:\Users\Admin\AppData\Local\Temp\39f2cb8d6335165a641feb409e011be2ea6e44132c32b2e3830c1e7c906a8dce.dll,#1
                                                      2⤵
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:2744
                                                      • C:\Windows\SysWOW64\rundll32.exe
                                                        rundll32.exe C:\Users\Admin\AppData\Local\Temp\39f2cb8d6335165a641feb409e011be2ea6e44132c32b2e3830c1e7c906a8dce.dll,#1
                                                        3⤵
                                                        • Loads dropped DLL
                                                        • Drops file in System32 directory
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious use of WriteProcessMemory
                                                        PID:2760
                                                        • C:\Windows\SysWOW64\rundll32mgr.exe
                                                          C:\Windows\SysWOW64\rundll32mgr.exe
                                                          4⤵
                                                          • Executes dropped EXE
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious behavior: MapViewOfSection
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          • Suspicious use of WriteProcessMemory
                                                          PID:2804

                                                  Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Windows\SysWOW64\rundll32mgr.exe

                                                    Filesize

                                                    159KB

                                                    MD5

                                                    8703c6aeb2e62da71e50db9698d91e35

                                                    SHA1

                                                    cafceda794c5b1976b46a5d39949137aba8dc9e6

                                                    SHA256

                                                    c3a332de99e2b195bbb3e5927f8ee4217f968bc373f8c499db45db0b3388d47d

                                                    SHA512

                                                    48e45868929fcacfa06c5078de2e54d32cfab80e5dd00036b37f3d55b33269f0ee82f46b68e7a6adc2ec9aecad8672393a77602c1b995133876c2c4e6d15229a

                                                  • memory/2760-10-0x0000000074EE0000-0x0000000074F18000-memory.dmp

                                                    Filesize

                                                    224KB

                                                  • memory/2760-12-0x0000000000400000-0x0000000000464000-memory.dmp

                                                    Filesize

                                                    400KB

                                                  • memory/2760-22-0x0000000000400000-0x0000000000464000-memory.dmp

                                                    Filesize

                                                    400KB

                                                  • memory/2760-18-0x00000000778BF000-0x00000000778C0000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/2760-21-0x000000007EFA0000-0x000000007EFAC000-memory.dmp

                                                    Filesize

                                                    48KB

                                                  • memory/2760-8-0x0000000074EE0000-0x0000000074F18000-memory.dmp

                                                    Filesize

                                                    224KB

                                                  • memory/2760-11-0x0000000074E90000-0x0000000074EC8000-memory.dmp

                                                    Filesize

                                                    224KB

                                                  • memory/2760-9-0x0000000074EA0000-0x0000000074ED8000-memory.dmp

                                                    Filesize

                                                    224KB

                                                  • memory/2804-16-0x00000000778C0000-0x00000000778C1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/2804-13-0x0000000000400000-0x0000000000464000-memory.dmp

                                                    Filesize

                                                    400KB

                                                  • memory/2804-14-0x00000000002B0000-0x00000000002B1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/2804-15-0x00000000778BF000-0x00000000778C0000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/2804-17-0x0000000000270000-0x0000000000271000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/2804-19-0x0000000000400000-0x0000000000464000-memory.dmp

                                                    Filesize

                                                    400KB

                                                  We care about your privacy.

                                                  This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.