Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01/01/2025, 21:22 UTC

General

  • Target

    5dad5038ca709df6acb3e2d505e145483237b4317043e1acee07e699a531531eN.dll

  • Size

    351KB

  • MD5

    eb8fa19bf1959f712de25400a18ca640

  • SHA1

    3350264ebfded0e67ffc9c85781e847aaf05b492

  • SHA256

    5dad5038ca709df6acb3e2d505e145483237b4317043e1acee07e699a531531e

  • SHA512

    1c7fb884a2ad03b93a5b4254a521f956942437b1efec3c0fe49d6c51e6b20c3b25d1baa3efaea111b0ae684629395b7abeef772e47d430dcb8ad90c04b263b42

  • SSDEEP

    6144:Tn/A0HosZjgJ7H1g/RzGC46oAV3Hc89fTLBf0dJ5TTBZbspom7bXn/:LNIsMOV8+V3c8xN0VTTbM/P

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: MapViewOfSection 23 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\wininit.exe
    wininit.exe
    1⤵
      PID:384
      • C:\Windows\system32\services.exe
        C:\Windows\system32\services.exe
        2⤵
          PID:476
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k DcomLaunch
            3⤵
              PID:592
              • C:\Windows\system32\wbem\wmiprvse.exe
                C:\Windows\system32\wbem\wmiprvse.exe
                4⤵
                  PID:1616
                • C:\Windows\system32\DllHost.exe
                  C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                  4⤵
                    PID:284
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k RPCSS
                  3⤵
                    PID:672
                  • C:\Windows\System32\svchost.exe
                    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
                    3⤵
                      PID:740
                    • C:\Windows\System32\svchost.exe
                      C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
                      3⤵
                        PID:812
                        • C:\Windows\system32\Dwm.exe
                          "C:\Windows\system32\Dwm.exe"
                          4⤵
                            PID:1128
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k netsvcs
                          3⤵
                            PID:856
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalService
                            3⤵
                              PID:964
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k NetworkService
                              3⤵
                                PID:112
                              • C:\Windows\System32\spoolsv.exe
                                C:\Windows\System32\spoolsv.exe
                                3⤵
                                  PID:1056
                                • C:\Windows\system32\taskhost.exe
                                  "taskhost.exe"
                                  3⤵
                                    PID:1064
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
                                    3⤵
                                      PID:1172
                                    • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
                                      "C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"
                                      3⤵
                                        PID:1500
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
                                        3⤵
                                          PID:2496
                                        • C:\Windows\system32\sppsvc.exe
                                          C:\Windows\system32\sppsvc.exe
                                          3⤵
                                            PID:2132
                                        • C:\Windows\system32\lsass.exe
                                          C:\Windows\system32\lsass.exe
                                          2⤵
                                            PID:492
                                          • C:\Windows\system32\lsm.exe
                                            C:\Windows\system32\lsm.exe
                                            2⤵
                                              PID:500
                                          • C:\Windows\system32\csrss.exe
                                            %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
                                            1⤵
                                              PID:392
                                            • C:\Windows\system32\winlogon.exe
                                              winlogon.exe
                                              1⤵
                                                PID:432
                                              • C:\Windows\Explorer.EXE
                                                C:\Windows\Explorer.EXE
                                                1⤵
                                                  PID:1152
                                                  • C:\Windows\system32\rundll32.exe
                                                    rundll32.exe C:\Users\Admin\AppData\Local\Temp\5dad5038ca709df6acb3e2d505e145483237b4317043e1acee07e699a531531eN.dll,#1
                                                    2⤵
                                                    • Suspicious use of WriteProcessMemory
                                                    PID:1632
                                                    • C:\Windows\SysWOW64\rundll32.exe
                                                      rundll32.exe C:\Users\Admin\AppData\Local\Temp\5dad5038ca709df6acb3e2d505e145483237b4317043e1acee07e699a531531eN.dll,#1
                                                      3⤵
                                                      • Loads dropped DLL
                                                      • Drops file in System32 directory
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:1784
                                                      • C:\Windows\SysWOW64\rundll32mgr.exe
                                                        C:\Windows\SysWOW64\rundll32mgr.exe
                                                        4⤵
                                                        • Executes dropped EXE
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious behavior: MapViewOfSection
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        • Suspicious use of WriteProcessMemory
                                                        PID:2568

                                                Network

                                                MITRE ATT&CK Enterprise v15

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • \Windows\SysWOW64\rundll32mgr.exe

                                                  Filesize

                                                  159KB

                                                  MD5

                                                  8703c6aeb2e62da71e50db9698d91e35

                                                  SHA1

                                                  cafceda794c5b1976b46a5d39949137aba8dc9e6

                                                  SHA256

                                                  c3a332de99e2b195bbb3e5927f8ee4217f968bc373f8c499db45db0b3388d47d

                                                  SHA512

                                                  48e45868929fcacfa06c5078de2e54d32cfab80e5dd00036b37f3d55b33269f0ee82f46b68e7a6adc2ec9aecad8672393a77602c1b995133876c2c4e6d15229a

                                                • memory/1784-0-0x0000000000400000-0x000000000045A000-memory.dmp

                                                  Filesize

                                                  360KB

                                                • memory/1784-1-0x0000000000400000-0x000000000045A000-memory.dmp

                                                  Filesize

                                                  360KB

                                                • memory/1784-5-0x0000000000220000-0x0000000000284000-memory.dmp

                                                  Filesize

                                                  400KB

                                                • memory/2568-15-0x0000000000400000-0x0000000000464000-memory.dmp

                                                  Filesize

                                                  400KB

                                                • memory/2568-14-0x0000000000270000-0x0000000000271000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/2568-13-0x00000000773F0000-0x00000000773F1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/2568-12-0x00000000773EF000-0x00000000773F0000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/2568-11-0x0000000000290000-0x0000000000291000-memory.dmp

                                                  Filesize

                                                  4KB

                                                We care about your privacy.

                                                This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.