Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01/01/2025, 08:53

General

  • Target

    JaffaCakes118_4edc0a2fec9680dbce0d9df36f275ca0.dll

  • Size

    616KB

  • MD5

    4edc0a2fec9680dbce0d9df36f275ca0

  • SHA1

    c9c83b36855f22831b475f4ce6790a7d55d48a3d

  • SHA256

    0f39601af958f59cbcf3852168e030ee9bcd4913e0c21d6e4f3c9f4894f61331

  • SHA512

    3c3be3c5cf5198db67285238744bff4680b046f8b3b5a5d22b35280b01ea120f3d62703efd45c79b37ed93a1afa3ad104c94515032c43f0b57a01c9e45bd30a1

  • SSDEEP

    12288:e+JU8nPSoBLSCO6KDgD5ZQTgZT+ioIhTl+BtXDg0TnoxTG:eOhBOC+g6iokT8BJ00T

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4edc0a2fec9680dbce0d9df36f275ca0.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1856
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4edc0a2fec9680dbce0d9df36f275ca0.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2308
      • C:\Windows\SysWOW64\rundll32Srv.exe
        C:\Windows\SysWOW64\rundll32Srv.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2836
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2704
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2828
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2828 CREDAT:275457 /prefetch:2
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    53611522a96c5c6f8c52ea4e51c29189

    SHA1

    6337bbee49180ebf90afccef09a36ceb513d240c

    SHA256

    6783231c849c16a0cf91b814fb00d50982aa736f5ecf175a74495a0c68fd3bf6

    SHA512

    0c5c2cc44800312d6d3bf49546aac31a3a7d7cffc5605052544519853e5969c0abbadbe6b47e4ee00bc3742b4fb537dc386ae2c8cdad296cc0aa4f4a08ca1819

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3499d646a20be83a755509698a96bf91

    SHA1

    818b65988bb61f2185fc225cf9a2aa3d12d24951

    SHA256

    23bcb350af8c7afaf6f8867dbac8f0efd433067a16d63871d029754c5e1d34b7

    SHA512

    eefd67e04bb7d831b1f38b67f0fd97e0be05383a77f31b3c677d07fb2792cb878597b3d95dae3e22a8602ac2928fff2c80025a8e92e8f129f4c2a7e825c24e3d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    391a7f456f337c2893153c7272ec8247

    SHA1

    f20c90020b3205db6d1fde28bce4258d0167e274

    SHA256

    818797cedc3d7968d951f39b6119e261dacb9ce66d07d09e5e2a23bb8ac85fdc

    SHA512

    b416e95f9716ea9a514e7c91519f2a32975aec276888dc098d9c97696d83adabb0846a2599807b62d198ef00e4d410e75d142c20b9d6cc2d72f11a2e6b9edc17

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b5eb0f53254e4de89c390cc4f6053026

    SHA1

    7a5f659b1ffcd4080a93ce91ab4e0b85afa5b858

    SHA256

    4b7ee640627fdf6ac67b05212978ed8744561e52e82f32a33908f7fe79577007

    SHA512

    016c1d89a0560411aee9ff1f868740f3378e17281a16879f9af5bed9b70852915c6898e390c4420d00199c5717f8b244d223788b59d61bfb6cc321f24e1df8d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b1c170ac6b153a7074bce9c8103cc54e

    SHA1

    55a58442f6e58d4f69b40659dcf29a2d0fbdec51

    SHA256

    a6b01a5a4eafba710c5914541280a5415461f059291489b52d56637655405388

    SHA512

    a7b591a16f577886cbfe172ba3bbd79b2ae723c44dc07793a6eef81daaec94f23ad488222c86cfa47f43f9fc9791ffba64ee5cb33fbd319694e1badb8fa91ba0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d087f23ec59bef10eeb9cee4a58000af

    SHA1

    fc807a50193c2d463def7766be09e6996988d5e3

    SHA256

    40b3343e9a55f481d97d04cb8619d284df42ef1ad8d8697c46d34588929e3cb2

    SHA512

    6902e3bcc6cbd3718ed93ff09dab95ed28f8fdf465fc1cd59dd4d692a116cf3e357a47383f6f4d1309777c0e2691b3974b758a83a3cf4079e33b9700b463ce81

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ffb7cde3df870f2a81b0a0d6a530e045

    SHA1

    2b656a10588eb435e5829d8f3cba5d703a306967

    SHA256

    2f87c097b2726f3fa5ffbd26cde38b6b4bbf556fff8d34939cf4e6f40b22176a

    SHA512

    98efae9486b0452129e0335a0d0637cd6e0dfd101846133935fcb45ce2477b4c1e022bea0dcf6b298817f776c267a5e96197ce27dadefb046acd61a317b9887b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    287ded44fed1814a222ddfc25b6f89df

    SHA1

    321eb9cdf4d516c843161e9c10217b3846346d5c

    SHA256

    9a0b9a887e60ea83b615c752abfd20d9c2005299036cf99264f74833d6ca9a68

    SHA512

    34d634581dff6d0f6deeadf937d6f820c19b78e9f13de0e6705de25d7354e279e0f6244551ff966d55b7e7b229416a6ebdfc3f5f81f8dca78a55697fa7f62557

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c8f8cf864dc8abe04acbeece8d25e512

    SHA1

    0318b925d916db27c316e62b39eec20c4b2423f0

    SHA256

    50c9f67899fe0ee9cd997ed10c24c482c1316ee371cb4ff67f5efde4ce842392

    SHA512

    496c52f86a20e5e12c936280bc5fe49322a5494671693c07ee9be6a2bf0fd3a0f2773cb0dc4dd3b5cea996ad05198d225fddcde107f8b6a451d70c180f84b5f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6dc343e212e5f6c58479c89659b15ea3

    SHA1

    31be49f7ccbd8d1fa04a2125f09e4f8f2b813437

    SHA256

    b9401fd5b93a93ce1c78966e5cd16e872046ed21f181c7c8f67742dd5ddccee0

    SHA512

    87f042405a8debf24313e89691910c3f0391b8b57ecc36ea4a98fee60e876051fa891832d3c4feae28c89fb4a7f6a72a953210836d9ea55ceed498fa7ef61131

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fa60deb0495dba512287ba487b3778fd

    SHA1

    2cc4a8c3c0dfe9302eb1cf4418b2f0d960c0c64b

    SHA256

    df1cac08b69a8b4b5d25f42e8a440bff8bd3d13303933524a4cc593ea9fab954

    SHA512

    94d68fe923ecee180f3edd31388293c20202feba92c753ac8c990d08a17f4d438bb079c3688bdf4cd775a0ca73cb46c76a196931a56edb540991161c6f89258e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3d6782aee3bf08512068d5f663969613

    SHA1

    5ac64f5ef5ecbf47897be42a4e15135633a26f5b

    SHA256

    6b141340b369727e2390e2f8408c50ce8b1280335ceaebb5a8e188c938e27198

    SHA512

    c749068d4b902204c7fa59dbb4b599a9a873a73aea3f972e72608983c8bc2d8e9febce0496877392bad19d42b77505141fbe03351495e6d37b70e38cc14adb50

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b19cb399b8d11b21b311588fcb998a52

    SHA1

    82ff6aa7a4154d4d4468903d649e789ade4e439b

    SHA256

    53a40a1305b756176e7042354ff8898ff4dd1de73d16454a1d7d198102f87343

    SHA512

    6151cdede8f763f0f471d042f05227bf52bfb32fc66ef6aab8ba0611bc64de80d6912d6cec40d68dfe1be2eefe5bbe44b35bce964606997eddc0227946cd0a3a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    89aae4dfd325ce45cef4a16daacf3082

    SHA1

    9e6b53d30999fc007b4279f0b7dc884ff7c18417

    SHA256

    0b33e7d98b89fc66c948f49e41979915f7bfcc475a9348107d2fdbf7941d75c0

    SHA512

    561d50dd2ce0cab014fb0d3e500a419fe8017004e04c474e911c1966d99d8787c60b571d253a1555d3ba7185f57bb62067b7e60b8e6c96222718b47727e74da0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    34c8d1c4d487b0aeda16945e5f04db6f

    SHA1

    56f7d94c39bc95a8bea08b010f4e1ba30eea5563

    SHA256

    809bac8636acbe7fca1212120e3d5c22933e38dbd4a88e735872760ebdb7e950

    SHA512

    4dabaa68eb1e32dde03ed9e4d701016a0ea8edfde265d24da29693c75885ce39b1fd1bfa43d89a804c0fa9c54b74400f02f5a566cef6d925fc9da70f2c931ddc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4b5dd7151759fec192f0e374ca1e2307

    SHA1

    0749a7edea8dec5bc909100c39a943dce4307445

    SHA256

    0045adf1f6380189f3f88bfcd55469f07155d0066b01cb1f43f552493dd15196

    SHA512

    d70f462cc08ed3519b28bb01bbf4328ffc9604930633a1290b79e2ad35af1b805b7e3c3d3dd515f7b014cf6f163341796552ecfee0b1754a21e25e7da36ac0ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7ec1af5d0687d6f37ebb5a2dc7f5a068

    SHA1

    799fbff5530ae8f3fe175f3ec389631afe0c4a75

    SHA256

    3bac3875bc9fa512a579d6e51e389476463eb3ca41c51c8e381aae6ae26a0e7f

    SHA512

    a152d76ac8623da0b1131c6ee8031df28824faf9706a2e5630bf864a088e338e89c6760b0e3764fcdd23be33682167b98d727c6bb83a9ac2c32cdca2f89c5e50

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8aff51e35e637bf207b2ea04a1128b17

    SHA1

    022087839da66020cd570d3ad29e0f8bcf110c3e

    SHA256

    19806655146dbac5f533f1e42c94f2ca498973c82af80195e590e93d027d9de7

    SHA512

    8fcd438d0ddfa8d39272509d0596baafac25985712a29ed926d9e903f540b4b33cd7d2b4e50de81548b4171f35f141042e850360216f2c90f7098e01234394a3

  • C:\Users\Admin\AppData\Local\Temp\Cab8DA2.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar8E13.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Windows\SysWOW64\rundll32Srv.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/2308-11-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2308-1-0x0000000010000000-0x000000001009E000-memory.dmp

    Filesize

    632KB

  • memory/2308-2-0x0000000010000000-0x000000001009E000-memory.dmp

    Filesize

    632KB

  • memory/2308-0-0x0000000010000000-0x000000001009E000-memory.dmp

    Filesize

    632KB

  • memory/2308-7-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2704-21-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2704-23-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2704-22-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2704-25-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2836-12-0x00000000003B0000-0x00000000003BF000-memory.dmp

    Filesize

    60KB

  • memory/2836-13-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2836-9-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB