Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    73s
  • max time network
    67s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17/01/2025, 05:53

General

  • Target

    2bdb6335dd7e0f88be9ad2a2ae36447da628c5e1430ff2fd159cebbcbb0b9024.exe

  • Size

    101KB

  • MD5

    f4a0ec3dd3980982fcf309dfefda6df7

  • SHA1

    af325e6c978c10324c5807f599cedfa4fa2ec5c5

  • SHA256

    2bdb6335dd7e0f88be9ad2a2ae36447da628c5e1430ff2fd159cebbcbb0b9024

  • SHA512

    cea38f929fb7639e2177559aeab42de99a9b419bbd94b2148bbaad0f59c7195029ee038bfe0c488a35aac84ab402d2459f6b8e3cc3e422c7f3f1daac53e49912

  • SSDEEP

    3072:0BKwcvdwuxdWikJwkpGUkAuadtEtHXRKr3ib:0BKwcvdnVkpGUZuaLEtHXRKmb

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2bdb6335dd7e0f88be9ad2a2ae36447da628c5e1430ff2fd159cebbcbb0b9024.exe
    "C:\Users\Admin\AppData\Local\Temp\2bdb6335dd7e0f88be9ad2a2ae36447da628c5e1430ff2fd159cebbcbb0b9024.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2164
    • C:\Users\Admin\AppData\Local\Temp\2bdb6335dd7e0f88be9ad2a2ae36447da628c5e1430ff2fd159cebbcbb0b9024Srv.exe
      C:\Users\Admin\AppData\Local\Temp\2bdb6335dd7e0f88be9ad2a2ae36447da628c5e1430ff2fd159cebbcbb0b9024Srv.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2148
      • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
        "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2528
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2156
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2e65d0fd48874b15e3a4c337cf6095c8

    SHA1

    15c65aa05dbfadfe2915ed6c4faf5204027c58ea

    SHA256

    dba52a43620d9e62aafe3e5cdabf587028f4f5546e01777f9b2bf3c1dc2a6942

    SHA512

    4ba7e166da2babaa9ca549a169345cf5fa9a9534144e9b530b1b6bd608bddb90a5bfe4ce3f1675a8b5ddd4329cc89a00c26f94d5efcb2186e98357b4ff891a9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5e91757aac231747dd2b9b8e63aa69ce

    SHA1

    d10692f3d827dbee80632256459e5c19b3cb2649

    SHA256

    e64ff17d723f5f5800b1383d07a30794890986e990643958473f1f5b100b3f41

    SHA512

    5ba64665a1db7348e9b4c93a5f9d8ae0b9dba5a2e87f46c0edfe956a8e15d9963fa77a02b215018f2ab121a03d079349f77d1d04cec19eeb7ed2e586468cd7bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7ce766bf9ffe955fc2bb13d99953a841

    SHA1

    f365336754d63b889d08cbaace7b10910f00733a

    SHA256

    32acc9e655d9c79f4a12dd42639b261c88501df5ba6276b4a6c68829171c739d

    SHA512

    2e0897dd37ffa753110c342db9e9609c65793450f2a703621d825e85d7af2e5d1d71ee2f34981f596fa77b324d4d2ec58bbf7f76acb0477506664d7d2a4e60d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6247938b19cb5c44e83b8d810ac3f05d

    SHA1

    a90c21a878a73a9ff3447ec51a5893990163cf07

    SHA256

    4284e19946f701d81b59601a0191cb598e44ac45c2f23c4fb846a30675ee8cf8

    SHA512

    46cea0ef084360896a0d0bcf6827338d33848327ec014b1892f0dac5529e075ebdadaed637b2dae8c6026667f5cec82434d118523ff039a6a290db1a965dc7a1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6eae0195aca697e27bf4ecaf9b4fcf62

    SHA1

    a3c89ea0bea1e49ac74e751f9ba98da87553dd07

    SHA256

    fc5759a30ab63c8a07cfc64e4e02eab3b13f6f768a9b5a70c4abb8f49493908e

    SHA512

    a50b30bee7efebbe7db0f4e07a664627766d8ccdf987f7db16b8bcc3c7f16bff47c04ac79d01229ffa901f0cc17690c246c07d31007c270436b832abfcfbcf0c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d0afb3b8db0b8027826fb09cc98fb0ea

    SHA1

    af4a907b3086eb0fd6446aba850624e667dc5f47

    SHA256

    ea51b1164f8305b26dfbc8ce9de9e89525edc3bb21c8ac445157fd123ed804d9

    SHA512

    c6e0a1a0dc8a3ddd6d0cfd394b2f4bee40a3033e7e59f7fd79d76d84ac32d2b9df5dc8165bdeee2d89048385b0a0da620d7a9f4f8cd958cade382a3e2a2cd250

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c009961a085029f4418ef27271f2c52d

    SHA1

    5be599aed326c88308246ae07f633fc51f9be180

    SHA256

    bd261c3ff2cccda3b6fbde16f918f2dce87d0c2a99849488ee4874809e1d008c

    SHA512

    563cd4560c0f8656bf9d641d875ccf5b3937c1d792b00214d191f1bc4b76f6a41894d1fa5502f4f1d9b2f19118363c407b50faa062ecc615ea9c83b882fc0545

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c69a93dd7d7079b3a203e422e8c37103

    SHA1

    983ad6e1604d8904afbe5f531df940bb73a15503

    SHA256

    1010722cd400db83797c3b047629963704b1a8b2ba77967487d2f60e7623b639

    SHA512

    81369e9b7136d057d462f0909a2b4504d1ed572ca942ff8e679071e45091e4e6bef08b6192eb0ec9c11b1706fdd80780ac1c7fcdaa7f0099a8ced38ab7f74573

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b22e1070c6cd8f2e57d35164dd48c33b

    SHA1

    9b29c9d0149e00864b072cb184c15f413c95fd42

    SHA256

    dfb08497801e1e42865ff16c752b5806509662d4955a179c6fa53e0ddc390b37

    SHA512

    9af1c4338a875747c6331bc6f02684622a72e900cf3897fcacd808c46ad52f7075d7b23efcde9406fbc4a74545d197a7524999bf8218b16c53b073fd51232dee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    400eaefaee485481e870b3471121e11c

    SHA1

    070e8ca7d477aa7b02c94f95e58d2f3da66a0edb

    SHA256

    0459e9e3cda87f48e82f7a21f875a88f5e5956ae48eda96ae23a40a74bec5fef

    SHA512

    43a43e9e05cb0fcba0a6346e50ac1203a651fb0b6ac1f565a4c8115a58f9a7621b80a492bc394ca357142ccec732ccf1a12ca2f4e6f58b3ddd98f6aa1898c798

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5927892bb3fc59754523dd21e7b16755

    SHA1

    1415cf5abc8cc4a1c256898965cba23709348d05

    SHA256

    ad79e310874f76b34e5cd8e89ac71ff460df11efdf028573de932dcf9df38978

    SHA512

    0cc2431087be84973331266c48be217fd674fef2cee5a0573f0ce9dea90e9db1346f6288378fc13f213b0e7c61015cc5361329a9c82efd77f80e30693deeefd6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e97546a342142c51a7aff8eec8746990

    SHA1

    2ee76ff8a6bed2a4c715bc62c54985eb646d4ecc

    SHA256

    7536f97cd16e1099c92d803f375faeb627910f335af0df120032e3a081fa5a31

    SHA512

    947de72748dcf93c9d5db821d75ec8a57118b621415a448d6f6c3b47dc43fa6e7eac5013e9aee3fb299c0faa1f44f2997b9898b5997e86928341db5b70dd83bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b90efa056001561654d85ce4c8c25899

    SHA1

    7df13d84ac4424f69a31ee1e254ee87d4f76bbb6

    SHA256

    b487d10ba747a53748ee4bca03f2edccda9f153c78fa6f6d99b474a2c6d782c3

    SHA512

    83d2aafeb50fd26aa0d4019c2368eb434eccb70175777d73c85bd89ff7d23f31390e377f2ea1aba39417cd6a609353a505a457633b4982593d3fd28a0cb05ffb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aa2aeef633e5cbdf15dad95284997f04

    SHA1

    39c7629023658bd949444ded0cbd4c80092284f5

    SHA256

    a87c423e08838123c0a69e0f2803f522b420acf8db767e548d353bf0bc2bc732

    SHA512

    39b8c4b4311da5198935802b6088df6a0f00d4d60fafbea3a17bc9d6749642bcfdef138d74419e7b1e643e8e01f84fd19ab024896576cf5a12e170e57b354e7e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5fb1975d4e39c508c0576abdab9fa8f9

    SHA1

    00e384a8f499862f986bd15e9a4a9fc590711603

    SHA256

    233c9925b3038900c7b192ef193843c5f388f4f86277b2f40bcf45939e8eaf8b

    SHA512

    af7e53591b4aee4845bf72e9693ad732fbc2f7b402d0fc8a9b81bd545f4007e5ba59ea7d52c342a0b2f5ed8f4436ed8db693ab965dcf27262d1771e6460c90a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a18eff7f196ecc41c8f167ff00736db9

    SHA1

    0fd9bc2ecb706425b3b57d6ab53864a98fd194a6

    SHA256

    c2e00ac8e27ed83f01d36b5292c56106f4b0a1a13ccff4a3345a69b0ab5e9d6d

    SHA512

    11cec6ce2a130ae05d5e7a1bbbc55db9fcbbe2df8a7059f2e934c6558d203d446a512311c0406c18963581215d705b53bd42b7972b6f3c60dda9f68b296fe926

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a21156d052720a4da10aeb388eb50103

    SHA1

    25ef205ff71eacf01311400340edda33e4f1fc7f

    SHA256

    7f93d098553644f9cf642fe4a94aefa67b7a7b75383fdc2fce0dae6eb6577fc6

    SHA512

    b455bf0482665cca5a982778e6fada9ba071965d3e4c3060bad5b18fa8a22723f04f6a71adccff8f831d1adee8e15ebde279de7adfb3b3f038a1077868007185

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ba9a5314f199832e5377e3f9c01ccaac

    SHA1

    20cf0f7979782390a97220f09fa62b41799c1ca1

    SHA256

    0d09856d34a9e913f8e2e755801550e2b2c831a46ac49e6a7982eac1e14bf0c0

    SHA512

    1040f9d57cc4dfb739d9441804d3ca6bbef9567a7c9364327fb6541ab1ebe32b4bf7343083199af1a7959ce680e5b2fc043d6c10afb99dc569fd9d09d0610e28

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    671084ca40b5a6c4688ba04bf4bc56ce

    SHA1

    f722752ef362a7230f31e19e26b965d63da22e87

    SHA256

    36be9cbc72ac3d1752e9161a9a0ffb86ac094850c42b1d816dce7d3f608bd01b

    SHA512

    a9efc80803ccd5b86d50507f663b377b8865a9eaac8ff7b3842c42df37ad5b751a3fb3b88e5c311d4e16700f87e1f5ef2ae3fd2d1e7d986c5632b1aedeaaedda

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    65a906708af2aacb0f1321b2ebf9192f

    SHA1

    998846106daf0d99e740b146c9a8c5dc6c925612

    SHA256

    fbf6120e193bf6d1ccba3cb2e396b22222d90b2b55fb64b3d7c42e8d7c47675f

    SHA512

    38c4259f854b7607343d8c78f4b2bc94b45d504f4eb72207394d4c7344ba6e87c2077ec602375f63d0145063706eef8ee04d8b025917992021df5fda894be5a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1616a1633865a58772394f7503422e68

    SHA1

    51d6eeecdd1851fb892a77a1c4d9cac6949d648f

    SHA256

    184f0d146f57a69ac80a2f0781391f57ee6c0b71aba3140252ef9e8cb8c8da27

    SHA512

    b8e4a5964a5da88fd4ec2185f08cb0d520e8f0fcbc483db2767bd88c55f662b8652040667bf9deadee6a4a99c61c956b2f79e598393bf5e8dd379482f756166c

  • C:\Users\Admin\AppData\Local\Temp\CabE949.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE9F8.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\2bdb6335dd7e0f88be9ad2a2ae36447da628c5e1430ff2fd159cebbcbb0b9024Srv.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/2148-15-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2148-7-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2148-10-0x0000000000230000-0x000000000023F000-memory.dmp

    Filesize

    60KB

  • memory/2164-1-0x0000000001000000-0x000000000101D000-memory.dmp

    Filesize

    116KB

  • memory/2164-5-0x00000000001C0000-0x00000000001EE000-memory.dmp

    Filesize

    184KB

  • memory/2164-451-0x0000000001000000-0x000000000101D000-memory.dmp

    Filesize

    116KB

  • memory/2164-21-0x0000000001000000-0x000000000101D000-memory.dmp

    Filesize

    116KB

  • memory/2164-22-0x00000000001C0000-0x00000000001EE000-memory.dmp

    Filesize

    184KB

  • memory/2528-18-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2528-19-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB