Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01/01/2025, 05:44

General

  • Target

    JaffaCakes118_494d69e401710d73f9fad92ad9b63ba0.dll

  • Size

    178KB

  • MD5

    494d69e401710d73f9fad92ad9b63ba0

  • SHA1

    38c906d88174bc3f557fb983ac4ae362dbca7d0f

  • SHA256

    4e1054cd19da53cc44cb335cc09099d9d8e834aebb370bb87d19359ad4d62ec5

  • SHA512

    f3c90adfbfd65feab88568a484dd548e1c472271b2659b49dabbef77b86759c02c020ad2bc17d3ce4686e06015973d76e25f596017aeaf2cb7c8b43b68282bd1

  • SSDEEP

    3072:s3tpFztj7IKML0E46mIWhixlDsx5nb+P2XY/43n9M9sbHNl:0tprjsKEQwSjIAhl

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_494d69e401710d73f9fad92ad9b63ba0.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1348
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_494d69e401710d73f9fad92ad9b63ba0.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2508
      • C:\Windows\SysWOW64\rundll32Srv.exe
        C:\Windows\SysWOW64\rundll32Srv.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2116
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2136
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2768
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2768 CREDAT:275457 /prefetch:2
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2780

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7dc1c7e495cfc484269fc2f5671455c3

    SHA1

    bba5925e35bc07110bf0fc796483f2d444aebdc1

    SHA256

    9660b02cc4f2f9f9e2d621555b2f1f1c7a3bd4fd72aec7f504d8908f7bb77526

    SHA512

    ae0a2960fb316cc2b398e38bc917ec6ec9845b2b0e1274e1a8a5b599096281aa9c396911920663785672d1bcfc2610fd874410df4d7a7e00187269e770de4ed5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3817ced599f3803eef09da8b084a2582

    SHA1

    1f8f1561bee162c326bdaca89b4c2ebceb7a66ec

    SHA256

    7252472ec22ae7b506acc2fc6ab00f553cb1084d0671dea52dc8f06a16e65914

    SHA512

    82c821d41aac436a4062ca2dee62388b9422893509a9505890fab7523fa5d0c5ecb2de2f4a0d6d9e2ee8a515b92b243e9831c924056f7bbb634c485f22bc86f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    11ce377999c4cc38c0f85b70c4a248a7

    SHA1

    c0deaff295cf7491b8be6159e7913da0b7e968e5

    SHA256

    8f13f9d4b55a28296e1ed5308c7aa6f062302c851b49dda872b2461fe22cde34

    SHA512

    2a8cbd649cad0675aa1c1f3952dee2dbe0cd5e57cd05de74d8a429d215fd40568de036c4c2e5218ad0e9a9146fd4ec3a286067768590c8a35651ebb7247e6fcd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6a2cd4e4d465dbb8e10eca130dd9231e

    SHA1

    1abcb84ef3c565f798e987397f52904ed3a6d21c

    SHA256

    a32dbfa3e4a99438557254540f8f0971ef9005914cb43bc3f1e570adadba406e

    SHA512

    096763a54c0de35b8fe027353cc6346b947737e74232509e141bf038876d973f1911feb05d2439d1c6594c37e00b950646712a70232fb24cc39decbe27b1316f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    af34914b4034903ccb37dfea2648b3d3

    SHA1

    21bd22a134ee72d06747a313de88d8bb99df7e88

    SHA256

    8ece45314d2bf672b350b0ff3c41b44547219f7b1d1caaf20cbfaac608effdfc

    SHA512

    35f407eb955f163c5938968d122bcd23e374857fcf318e0ae8d86a0843ae0893be5a688ca13f1693f6ca382461c7f4f74ceef96c4fdf850156fb44fc3b47ff54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0f750c03a0087561bec9c5a114930ac6

    SHA1

    1e19a2f1827e9de92bd1399c63138e638c4a7080

    SHA256

    55ebf9545e7312261a6d001a5992d653cd0240dfafce3ad1529f4567b7f894d4

    SHA512

    41064609cd04d24e1809b6873d71f961ff73e498525df1cede1db6c0748228208a9172ca9317431a7d6e8765224b38934857078e4212f92f85b342833454b229

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    34f8dad4d564666b12ca933c49ba42f6

    SHA1

    1056c9513e4fbf9ee7bae31382a2f36bc060c451

    SHA256

    d0d2892480fa213e18086d390372c6df35f582db2fbf6a4ccb77adf7b676af0b

    SHA512

    4270f973db3065acd84ca41514af6ad0fa3afc5bd8b636681e5a44ed3346e41c9b499a04946f12c5526cd24ccfa5b2625bed3438ddf14109540aab28f8019a4c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3c51ef001aa3f3347982a98ad84b90e0

    SHA1

    d0d34c631fc74d42c805ab8e7e81a3b341668d85

    SHA256

    0e2645b5209a8c9a8f68e456c91578069140ad4119428a5251e377d5261b5fc5

    SHA512

    bda000c16097b75854d6ffef16356dc7d87a56665827d7498f5acec4acd4c06f1bf43f5a5e3af1ea5288fd5cd3a1b0621aa94b4fa43ff6734102fc468e670500

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    248a967d45cd2e3a52eb1a8c30a4993f

    SHA1

    8b513b62fcedf52dd8b4afa1e166ea32101aae09

    SHA256

    54f52c334a03717f5d1a33ebe3e924634946361bcea9ecdfbf1dd0ce2e7257ee

    SHA512

    26b3a46d1efe2c12e2c673c9b562d45e9464d588e3e3237edeccde9e179adb8ca04a9613c477a09b2963517c03d2e8874851213325aacc6d509c2b90f1421db1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    158848462d54007d8b21ca19d171a459

    SHA1

    3c716f1ec4d5e17d30dfc5eb8f14aa182bafbf47

    SHA256

    ede3e0508ef38e95b20f315624520d1fd50851e62d83ec2023bf117a724c037b

    SHA512

    c03ff5f67caaf8819e32e531a0e430bf70838ad782ab458ccc6b65f6c623cb4edfc8366c593ce2829698219648a4934ea0c3c8bfe20a4ebe1f81c44074b2fc6f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ab5b73403cffc271460bd34b38dd75dd

    SHA1

    0daea4a679ce6160589b6dfa9f98d6fe1535b894

    SHA256

    16997e0c9718cf5cc007305f7d58f68ce7ca60fd22166967b895df41bac0741b

    SHA512

    1352e9193ae9358d7fef01649ae00c19572986b0aec79c01394e9671e82d5798b52cc20c72a2a520009809ccef52e8647e8364bb03cad44b98c5fadb7d8f3ca1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7676939de9e43d07665387e925250ad5

    SHA1

    c5bbe6b6fad65fe8a87d4a67d61dc037e8568127

    SHA256

    4e9a29c1230f9f0231150a0e1950eb4cb20989f6d678e2549a0b342d214dae8a

    SHA512

    1255f5e0409b05a2361bac3d26995fbae2671208c7ca57d46f1f4598c36acfc516167b8b14a8eda59c5a66ec7ac4b757f6d79d9e6bd9807deff779eb574da116

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d072f050216b6aa13d52628f630579f2

    SHA1

    adcd16d42280f9572b2133724ffdb1c96a5f79cd

    SHA256

    b0ce7ba7aa31fe8c5563d0bf307185078f6757e4ff862a14a9a8d2ce5f6198b8

    SHA512

    c5aa9aff85dc9a108a29f748a0a49e6bf68264c06db2f1c86b863a89d2ebd5e7a4e09539c9fefe9f219d48566291c69eecbaaad9722a542f6b0b08653e7aab43

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a6eeb55e9e7221e36883038be1a57f56

    SHA1

    0523616f703481a7928a2497b5240f48e0cb3c17

    SHA256

    0744e075a128d76b3328aabd2ed3dffa9ec5737cfdc48a37645acceaad42b92c

    SHA512

    2a62105a6dba732ac1372dfcf1675a9ae57559874040973a683234dd3f3788cf95b434942a3a86571502e859aa2bc6ea00535d6173726dfc48bdbaa20f73aaf8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7f500d98575d233c4a745275613128df

    SHA1

    b2edbe905e1f4df926424d237493721360cedaee

    SHA256

    836375ead0b67d0aae0dede8d33d2f37af2c22f0fcac1abd676c0478652035f8

    SHA512

    35df16d64f477df58f52deff3d4630d655c4a53d3f58f50505bd3c16d5fd315823e56f01e5513c261b264bbb6c34385fe377d21a84f825d097224dd71bcd20cc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ed5520b9d54f159667712a62bdcc1129

    SHA1

    89a7def110aa2ee550a2421e0a3ad229cfb7b3a0

    SHA256

    c3924bd98947334a12a0237b2c1f85493a0f9d9586874f4f02927d11215f133d

    SHA512

    67783ded5bba98cd320ec9c528a1a63750be464f4d8122096710ea804332de043835044402fd223b9c5cc61842205e4712f61dae8a20e681c9a56b336dbcd403

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9b82e83914fa249645a3194443f3ac6d

    SHA1

    c9e9b3b1c09f1592e10a4acc0d35743631457030

    SHA256

    8cc7a668f440b9a541931182bc66f58f6c1070ff15b128b35f8943ee080befa9

    SHA512

    f04b8b9c248d9744e2b3c0d6db33ed7706802bada48ce560de9c37371d858d216f2a909ef0c9cb8003bc4bbf430098797cba977122d774a9293cb0491cd6e980

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fe549295029908418bba829abc374ca3

    SHA1

    d4375cd78549a677143c0ab598f4de8a1c3a1d96

    SHA256

    3373b21cb898d99e45c69b0aa7de05047276e5da1e611e8ed69a3e9021c2b3b7

    SHA512

    ff10fe5a06568df3fe441b8c5b5c78238e5081fc1efb6858d82f25b2cc848b24c67b29e0722d65c4bcfad53354640ae9894807922127b304abe64cfd08f351f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e73505d2dc486474379031daca25bd96

    SHA1

    9ceab3955fc9edea22739fe412930ec320a71447

    SHA256

    a93c846b0369ac3a9db11c50e007ae7ac692f89c86d876544ef464f046f416bf

    SHA512

    a4b77a97feae2f946a6deef5582dd6c4e6cb0de5fa39562dcaddb7e047d84800517baa669569dc66b9012767385059bacbb37644718378961d62fcf3a3d5536a

  • C:\Users\Admin\AppData\Local\Temp\CabCEC6.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarCF95.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\SysWOW64\rundll32Srv.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/2116-12-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2116-13-0x0000000000230000-0x000000000023F000-memory.dmp

    Filesize

    60KB

  • memory/2136-22-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2136-20-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/2508-454-0x0000000074610000-0x0000000074620000-memory.dmp

    Filesize

    64KB

  • memory/2508-25-0x0000000074610000-0x0000000074642000-memory.dmp

    Filesize

    200KB

  • memory/2508-24-0x00000000745D0000-0x0000000074602000-memory.dmp

    Filesize

    200KB

  • memory/2508-23-0x0000000074610000-0x0000000074642000-memory.dmp

    Filesize

    200KB

  • memory/2508-4-0x00000000745D0000-0x0000000074602000-memory.dmp

    Filesize

    200KB

  • memory/2508-11-0x0000000000230000-0x000000000025E000-memory.dmp

    Filesize

    184KB

  • memory/2508-0-0x0000000074610000-0x0000000074642000-memory.dmp

    Filesize

    200KB

  • memory/2508-1-0x00000000745D0000-0x0000000074602000-memory.dmp

    Filesize

    200KB

  • memory/2508-3-0x0000000074610000-0x0000000074642000-memory.dmp

    Filesize

    200KB