Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    134s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    01/01/2025, 13:13

General

  • Target

    JaffaCakes118_5678fd806c2b4a252a48b27a7d074ac0.dll

  • Size

    424KB

  • MD5

    5678fd806c2b4a252a48b27a7d074ac0

  • SHA1

    b479e77f9ab9d7c4c6fb88fa24b0671002096a6c

  • SHA256

    6e66f79e6e0f747ef866aa42f1f78c6ed271085c63900883173c7df2d9c24d0c

  • SHA512

    cd03882bb493d03b05fb5f56f90d037a756290d0ef0bf7dcc5ab5349eca324a406ec7481375df071e605d1094687fb437949b82d792704b467cca378514945b9

  • SSDEEP

    6144:G2sND6Qbi3NetW6++h2NSjPRKZASYLuYssAoIDC:q7aNeM6++h2NSjPRKcLuYsHDC

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5678fd806c2b4a252a48b27a7d074ac0.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2708
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5678fd806c2b4a252a48b27a7d074ac0.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2028
      • C:\Windows\SysWOW64\rundll32Srv.exe
        C:\Windows\SysWOW64\rundll32Srv.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3056
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2544
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:844
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:844 CREDAT:275457 /prefetch:2
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    04c451369819a5fdb465352c4f719ea9

    SHA1

    559b8ea3194d191eca1d44fa612776a7aa28c350

    SHA256

    25f5c1bc4b738689be94a84e5c1fa90475fa81d616357ea5dcccc9abc97ea778

    SHA512

    8464df4fedb1ddfddd844a760bf79958b47d6f23aaba99cf92d39d52e2a90639fed5d697884c742f6ab46026ec6cd35d981f0dde590a0d7f7e231b6078487bdc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7352cd51a6f13340f3bf6512e803f74f

    SHA1

    7b4f135e85213a8ffbf31e914a298111dc3f4d77

    SHA256

    4d75cd909bc2fc0be05997bbd8be847cd1a9abeca9dba7ebc900a6f946968b89

    SHA512

    502de55f21808b3713942e5095aa28db44e782198bd4aff1bf6f6f470640b37642575d31204dcd6a0cdf18d9589799fb08ee3dd3e89c3364948957ddb55cc081

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b07f3787f08f5cba0075efd3a9fff967

    SHA1

    8394d2d8a74e08cc28c443c260d3c4eeb2c7f719

    SHA256

    71bd7734ccc8d8f3fc511855aaba30553bd022c386ed9e019bf5ad4bc94c61e7

    SHA512

    e79b8633f896f8ec8939308c62b395a1dc47ae0d77dc9f391bbbd7e01c1b3304aced16fbd3c8755759b4f2cd68e25af2838b490433c1caae2e4296776165a5d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7104d3fc71295711064f6ee7350acfd7

    SHA1

    e7222ed43cf16015c35f72cece9a2c6f477281ed

    SHA256

    5f5f846f1fa099a582969d5df84241b41668c6696bda2a862685025e90c622e3

    SHA512

    b66402a5b6a84599fa4c15232662c520d3cffc792bfdcce20c8175f9db2741a7964928374b8ca2c33253c19049c7c64705e196fdf045150de0d0de953f557c62

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    072a50c4480491ae7672eb3cc12d5a4d

    SHA1

    a0257621dba4306045712d412f09079d227d3ca5

    SHA256

    e1d508a91df4dc087ec68d7bbf58cb06982018040792fa662c4ece99817f7a0d

    SHA512

    da4db9d11a2899cbe02fcf9a4630b4b54a06ac30945202b9509238e17e194713d7728e260fab7a7e5945cc175b3d96a7b7691a9f599f255c60d4ba42fc9afe78

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    377420828356f9262650a548f06851af

    SHA1

    767fdd68f2a958dadccc6436d1175b14d51136be

    SHA256

    c178a7420ccc3ffd6cf522454735064ff4c0c66e4685fb910d04cd1a86cbc466

    SHA512

    4ec223d78b4ec19b2b97b2104ec07949bb1283729c81e8eb23b2400a10875b6554066a8a1a9a32972906e304f2a64ef8253493364e4e29efd4e27621b22fb066

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    015cdfccce437b5bbb1a961f9bb69a29

    SHA1

    c5b773cac77fc9e1a7a558a23ea0837f8b8c2bd4

    SHA256

    0e9c40c19c1cf71f76baf15b8105ad061a627fe72076a239c4573d564b32726f

    SHA512

    8e45c50f6b97ccec8a8fc2db8116720c0c4a161415dbe81de41b538d5ce4544b980d05c2562c5bb3a50726c17e05a26d8941c03d44710a72accb937eb8f0d007

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f3f9b6022ee757a55522f50253b99546

    SHA1

    3141ccecc76d4e704b5f164e3ca12805a471a8e9

    SHA256

    22160e7c96b025dce43b3926424e5374d05ded5765b9328c760813f6892eff46

    SHA512

    af940ee85d591960271ac9fd05ba4b091516703d71edbe05bb2e9b8a8819ddd972cb3269be548ce0e0335a2dd11678a55ed91d9b6336fed67621a35869fb58d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a7c5e8e5d585aef2cb6d3401f965af9b

    SHA1

    668612f5d9c53e1efc73e8f694cdf69cfae7363b

    SHA256

    b1bba08ed5006268482e379ec31f3e8b936e6aede8fc1472e47876dbcbe8ed7c

    SHA512

    b512c57b1fabc7f8a0c2a3bfb7678b29142f305cd0368b8441ae7f60e0e358e4e9d430c60dc3cf409a6bf4c9010f3ff30b8635c5d6f38069a31acfece100696a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    abc140cf6ec623541b97a1a58bda597e

    SHA1

    d02c60e1d59698c80bd28e16f2999a8facb93a67

    SHA256

    36671523e1adb332fac9075777a89e8112be0f712758fec2cc18dc192e5a3887

    SHA512

    9ad04c9fa2b54b7ca8274216ef88a9f28cbda5a7eef8e8c5929b72024f5b55d3ca6899d9b51942f60650bda027c0fdcfd8a2ebd221dc06a7394721072bbe91e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    57bb382236d3692572a17090efc1c7b5

    SHA1

    c5d71c85a5270ceec08c21825509a96307dcab92

    SHA256

    06909088ad97c8e80302ff0b454efc23f23d29a4567a02a23a039b4c05cad347

    SHA512

    44a13507f4d24b262c2f8ef60300465735831e9a8b4209b51bdd6e9388275b997ce699483c01cb607cd7fc29847893d93773873959b5b8bceba62d8418fe8387

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    28efd566d1fe816a8d33130955796bf6

    SHA1

    3377ad533dc84f239f8718690aa000795ba5d13a

    SHA256

    f3589653905240b0b85db0428eda0bf4e53f1f47c33c624848b7890dbc88e953

    SHA512

    55a690f91baa7956181a5020e6f413a699e5e9d942d833805dc37cee0e5877e42c42a94151b8e4eff1df50a84d32cdea61bbc0c8bffabec34d29984da30f68e2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6409a883e9b225bdb08b15fe3b809fe1

    SHA1

    89738d48f488fd2907b912c46cb56271efbff1b4

    SHA256

    eec0ac2b652dc1c34a5794388397eab3ffec4ea0a937d44ac930f0ed61ef4c27

    SHA512

    f5686a0a2a2e8e583539216d1a9e9af13c8ce0804ce72e5175c1c7876bdf83507d6ebfb95ddc0e16df4d1ee4402dd3b4c54cf00f86b3ddcbec1a472e925ebcdb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    acee428edf0db06efffbecaaa4829f8e

    SHA1

    b866de293235e55b46c8161d201e89b4003b02e9

    SHA256

    161d6c46856a9e0f2c19a21f6ea7e301eff4d0b7dde80fbf1b7ca48a7c726809

    SHA512

    a26c335cf4c193edc7bb93461aa56df04df83faf6cb8239e0e9d226abd821876e9bedb3e23cb8bca04b7dda7e1effe677f740ca0db40bb14bd774f531a5d5921

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    639ee4233b3c8ddb12955a3a3e67c2e8

    SHA1

    ac0aa2284fc195745bbd419712f528ceaec2709e

    SHA256

    dbf65a3c26bb3297ca3d710fa6a4d7d99c86702ddb9e1e276cfc1cbe56bb30e2

    SHA512

    bb2e4dc6b5c2ca833031d715cd0dcc036f9fd7d61467e58d2956cb1d90efd4cc358a933d4c01c3f2028eaa5984c5bafbf46fe82738c568e0d95ae131e30ed89c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5d5a441a67dc80d8da2450885b0943ed

    SHA1

    18fbc817c641b0065a4f51b9595484e1a57016f4

    SHA256

    c20b124e835f5e4c756d772650601ea4b6479aa3a671a0754296f8829a6cdc01

    SHA512

    4f8a1a05dd9d6bc651d7031a6c755cf486213eff29256470d06febde4fea0ead61b84946ed50cedc405ab27c4e90feaceb00c33d99ba3ea15860c39d41748ae9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dfc6c08c7ea9f1cec7836e5004ec0c9f

    SHA1

    e443c4f7a7c093728c5abe77c5f09a26d51a92d6

    SHA256

    bce5706bb814c1dc68934e359617357e9555f4a01d53c053b3415da11dd761ae

    SHA512

    7013005d45574967352fb61d720d68661181d9e17013206d959cd7f20abc20448cbca767245c1eb129f1e72e7a535ab28eba5dff7641eb5af3cb1f33bc4ef895

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3f8afa29d539617c796fc11cbd6d3c1c

    SHA1

    c33cb58bb693d7d229d0b3d7576d56c02f5e99d0

    SHA256

    ccacca9a5bf680510429d7bff91bb988ac8d9380979834347100884225b98b16

    SHA512

    9646d73f06659559976d35a7e74eedabc98b976bee1e9c171959b596b75076eac7a011ffa53a6fccae28573e79cab491e60e5b4452aacc0a2a4f172825fe9524

  • C:\Users\Admin\AppData\Local\Temp\CabC18C.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC27B.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Windows\SysWOW64\rundll32Srv.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/2028-6-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2028-5-0x0000000060000000-0x000000006006C000-memory.dmp

    Filesize

    432KB

  • memory/2028-1-0x0000000060000000-0x000000006006C000-memory.dmp

    Filesize

    432KB

  • memory/2544-23-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2544-19-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2544-20-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2544-22-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2544-24-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2544-26-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/3056-15-0x0000000000240000-0x000000000026E000-memory.dmp

    Filesize

    184KB

  • memory/3056-11-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/3056-10-0x0000000000230000-0x000000000023F000-memory.dmp

    Filesize

    60KB

  • memory/3056-8-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB