Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/01/2025, 19:41 UTC

General

  • Target

    JaffaCakes118_0700d869bcca007465fa434e19c642c3.exe

  • Size

    106KB

  • MD5

    0700d869bcca007465fa434e19c642c3

  • SHA1

    68d870f8900aa400cf9a05f50169086c84dd2bec

  • SHA256

    27e2e6c12087d210ef70a0158bd45ec9f74511c2e6889ac7deac962a10bcd650

  • SHA512

    8075b770ce419f24e81db53c3200a5e2875ecd243b12a87559aed47e95b23cf0607a6a2a727f099c8700f62f81e0bab9af2d1bd17079b066bdbe4c22d140ec86

  • SSDEEP

    1536:M+FDoKtniY1u7Nn2JFkC2styJjCKICFjC7EWisS+5mlatSfkZ:M+FDzK71QkbstyJjCKICpC72s/mlaX

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Loads dropped DLL 1 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of UnmapMainImage 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0700d869bcca007465fa434e19c642c3.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0700d869bcca007465fa434e19c642c3.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of UnmapMainImage
    PID:2468
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2468 -s 388
      2⤵
      • Program crash
      PID:5064
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2468 -ip 2468
    1⤵
      PID:1052

    Network

    • flag-us
      DNS
      8.8.8.8.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      8.8.8.8.in-addr.arpa
      IN PTR
      Response
      8.8.8.8.in-addr.arpa
      IN PTR
      dnsgoogle
    • flag-us
      DNS
      217.72.21.2.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      217.72.21.2.in-addr.arpa
      IN PTR
      Response
      217.72.21.2.in-addr.arpa
      IN PTR
      a2-21-72-217deploystaticakamaitechnologiescom
    • flag-us
      DNS
      217.106.137.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      217.106.137.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      138.32.126.40.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      138.32.126.40.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      73.190.17.2.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      73.190.17.2.in-addr.arpa
      IN PTR
      Response
      73.190.17.2.in-addr.arpa
      IN PTR
      a2-17-190-73deploystaticakamaitechnologiescom
    • flag-us
      DNS
      28.118.140.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      28.118.140.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      97.17.167.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      97.17.167.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      197.87.175.4.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      197.87.175.4.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      18.31.95.13.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      18.31.95.13.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      20.49.80.91.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      20.49.80.91.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      182.129.81.91.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      182.129.81.91.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      22.236.111.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      22.236.111.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      88.65.42.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      88.65.42.20.in-addr.arpa
      IN PTR
      Response
    No results found
    • 8.8.8.8:53
      8.8.8.8.in-addr.arpa
      dns
      66 B
      90 B
      1
      1

      DNS Request

      8.8.8.8.in-addr.arpa

    • 8.8.8.8:53
      217.72.21.2.in-addr.arpa
      dns
      70 B
      133 B
      1
      1

      DNS Request

      217.72.21.2.in-addr.arpa

    • 8.8.8.8:53
      217.106.137.52.in-addr.arpa
      dns
      73 B
      147 B
      1
      1

      DNS Request

      217.106.137.52.in-addr.arpa

    • 8.8.8.8:53
      73.190.17.2.in-addr.arpa
      dns
      70 B
      133 B
      1
      1

      DNS Request

      73.190.17.2.in-addr.arpa

    • 8.8.8.8:53
      138.32.126.40.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      138.32.126.40.in-addr.arpa

    • 8.8.8.8:53
      28.118.140.52.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      28.118.140.52.in-addr.arpa

    • 8.8.8.8:53
      97.17.167.52.in-addr.arpa
      dns
      71 B
      145 B
      1
      1

      DNS Request

      97.17.167.52.in-addr.arpa

    • 8.8.8.8:53
      197.87.175.4.in-addr.arpa
      dns
      71 B
      157 B
      1
      1

      DNS Request

      197.87.175.4.in-addr.arpa

    • 8.8.8.8:53
      18.31.95.13.in-addr.arpa
      dns
      70 B
      144 B
      1
      1

      DNS Request

      18.31.95.13.in-addr.arpa

    • 8.8.8.8:53
      20.49.80.91.in-addr.arpa
      dns
      70 B
      145 B
      1
      1

      DNS Request

      20.49.80.91.in-addr.arpa

    • 8.8.8.8:53
      182.129.81.91.in-addr.arpa
      dns
      72 B
      147 B
      1
      1

      DNS Request

      182.129.81.91.in-addr.arpa

    • 8.8.8.8:53
      22.236.111.52.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      22.236.111.52.in-addr.arpa

    • 8.8.8.8:53
      88.65.42.20.in-addr.arpa
      dns
      70 B
      156 B
      1
      1

      DNS Request

      88.65.42.20.in-addr.arpa

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\~TM8964.tmp

      Filesize

      1.6MB

      MD5

      4f3387277ccbd6d1f21ac5c07fe4ca68

      SHA1

      e16506f662dc92023bf82def1d621497c8ab5890

      SHA256

      767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac

      SHA512

      9da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219

    • memory/2468-16-0x00000000775E2000-0x00000000775E3000-memory.dmp

      Filesize

      4KB

    • memory/2468-10-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2468-3-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/2468-7-0x00000000008D0000-0x00000000008D1000-memory.dmp

      Filesize

      4KB

    • memory/2468-6-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2468-5-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2468-2-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/2468-15-0x00000000775E2000-0x00000000775E4000-memory.dmp

      Filesize

      8KB

    • memory/2468-11-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2468-1-0x0000000000401000-0x0000000000402000-memory.dmp

      Filesize

      4KB

    • memory/2468-0-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/2468-9-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2468-8-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2468-4-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2468-19-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.