Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23/01/2025, 21:51

General

  • Target

    c9750a9550163893d1e7b232381615784a0b8e9df718a22e068ebec50149ed5fN.dll

  • Size

    232KB

  • MD5

    23af974135e8e99bdf15d9fa86f4cac0

  • SHA1

    cc996ebf2ca13eac1e81858cdd8407f332a77369

  • SHA256

    c9750a9550163893d1e7b232381615784a0b8e9df718a22e068ebec50149ed5f

  • SHA512

    80a2e19ee19e024cd20305a7ca50e1d092fcd218685c6e9624f315e5ddbd4fbe4222df3147c0f3687ab1719796a15822990c9d867524b0d1efd286a94dfbee08

  • SSDEEP

    3072:I/U9HG4s/LSPqWHx34+jSc39XtxDSiSq8uv3LlsAEQiw0p9dJ6:IOmzSPqWHB4+uy9/S1uv3h5riPbdJ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\c9750a9550163893d1e7b232381615784a0b8e9df718a22e068ebec50149ed5fN.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2672
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\c9750a9550163893d1e7b232381615784a0b8e9df718a22e068ebec50149ed5fN.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2784
      • C:\Windows\SysWOW64\rundll32Srv.exe
        C:\Windows\SysWOW64\rundll32Srv.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2832
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2668
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2704
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2704 CREDAT:275457 /prefetch:2
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    06e42e5bf314145b4b43eeaf5bc98565

    SHA1

    d0f99a4d14ce1262286bf01334d1c44609ae5840

    SHA256

    4192b0136d5495282bce0b28f67bd3adcef27fa870ded18d2809158187b42039

    SHA512

    d70a2a480dcdcf9238ef61d7de9cc67f1cb20c0e8e2a8968c46347fb22a330593402b5fd6ee2eba6b926bb00b2e338cc5b544ad3c47a0d4fc241df26c6696f66

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    340345d455853e8354d082900e3a6f58

    SHA1

    00760f007d5308ba0a5bf6733c6b0189da711e84

    SHA256

    6a7e2501d6bb742a49f5bea99be4a404fcd814b9ec7b4ec0b97642fdcfc415a4

    SHA512

    6715a82c87abd6560b8f265d1f4d3d5ff55109cb9c48a52b66ae0f9d787d3be6849eb92d6440e6dfdd65215c708b9d850548f69c8032f149a5350bd5d01c564b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e6a1739f9abb1fce115faad9bf0f8757

    SHA1

    9f032ed5da305d29828396f48fd26d1ec3e1c7c0

    SHA256

    4d7326b3504df0f1e0550e66c5e6a54112609d71471633eafb70a639954f6a59

    SHA512

    bea366a2c0df611bec26dd0ff1602c50dfcffb80ed98eb7bff9ced4963580bebea4f18b06d051d70d22f6d1652f1f9df3b9ecae2fd421740f3174d8e6b5f9679

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    11bc4c937eed213c835783982bae5acd

    SHA1

    ac6ec3bbe244d7ea0a2dcef8011f6434da6f34d9

    SHA256

    e86f6cbf8a1463642659c04d719395ef472884c1e7cadd7cbe8887e4d83422ce

    SHA512

    83631120a34d1aa13783a3ca0bd83d6bf4659f841d23a9398aa99afedd755af80516dc37e948d73a93c9cbede109ef0cc8f3bb2f4bc7577574d8712f456e7f9f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    123518bd10e255c2121b5c7479b362b9

    SHA1

    98d8a3044d476929791bd50068528735f8c3b389

    SHA256

    66d624e11989de6c74575b0b6dedc99129b6ad7912c09114dacf8f2b5712aced

    SHA512

    2a366f7fd840e63228125e1385cd9d17ee8391f17779538880c59d904968f500653feb81d48b29f06588a9a3531c7f4bd18920f2d6ce737fd3251fa24c721e51

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9a7a694f72a89052bf6ee1be9c10eaeb

    SHA1

    d468b3f5ed2853424d9315e80156fb03a0b1ec6e

    SHA256

    db382d1e256648d53e327ed1db9806d8d972d4f06742f9d79fd5f7b06f6ebac3

    SHA512

    be3f8744ede6d3088a1abab399d5951372581651ac8a0188ad7f28413c02b9c590429b06904bbe3ccf9a4e51e71c75e8ed37423c21e7f02b165fbf66f655e676

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6f3e32992396f5cda64a52dd5c4d9c63

    SHA1

    3951c0e7b3670c9f39f83a7bdf873aa5ac3c8849

    SHA256

    3804749bbc22b9b22ff41518ca465fe9f2f2e2d1ea84f442a0b8610b1b962aa8

    SHA512

    5d4de6eac59cb608d1384cc655b3bb804fbe40636712348c6efa77b58b5f214a6556b8611c5c9c088a3183a9f6fa9d0c586f1333902f4ee07eae9bb50f26583f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5d1b1e688ef53cde3a5d8dfd0fe8f26c

    SHA1

    3e28a360bab67a768034f20343a99909ae776b99

    SHA256

    4c578a7016b775dcd12b64aa39b301bcc5255b08be07bdd2f38349f941cd0d7b

    SHA512

    62dd9e4ef5d7f8bfb608b0ef8a12ece7fb93e39dfcee45503c93f064360740364e0dbee3fe700739c3f33d2071b058afb43ea04d7befec37ded12e0e97d72e38

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    657b039d6ceecdf83c7b6926f102698d

    SHA1

    ef22e5830c50da697d4f3d807f63de22e94179d9

    SHA256

    381beb6d807591741baac20badf35ba626348df9035ac983214c0c5b4cbaa2c0

    SHA512

    2a73a96fa3d9a6b2a69e989ec2da258509238999fea33832e6cbe8bd48a5ceeb8367607108252d53be76c279bc0384c8a4f815eb8c33145445edc9578e945073

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f6405d411d8013b7a84a137229459662

    SHA1

    1906047f6aee2e81d44afa3bc3b8ce2c0c56fd3a

    SHA256

    4fc28663336a05b5239724fbc67a8d9bbf0eb4bbe94c8d7333de215b8758e6c8

    SHA512

    97f22982249d5109d47a5ec13e91650cded89378ae3a1dccd3d34bb86a5dca2185aa3903343a48716b55db36c4981bfcb62bcc376c2aa1f0f52c14faab9bc770

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    104ca61ff6e9313cae47b698211c5fcb

    SHA1

    cb5a00f627bfec9d6eb1b3e3880694af86221886

    SHA256

    34834aab58fb6c4e7dca75e92c869b707ba1cc1c4af635f0c881cb360ce2d89f

    SHA512

    a1987d06afe5cfe49ca093f5c094427ad955bdaa83abfe1b6b929b4049db73d81f4d74628307bd1f084a9a037df77f924d3380c0d5352fb3ee6c99253ae9f869

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2fc1d19cc524e96a752ddd07b4fd1f5c

    SHA1

    f12a3a71e62c61645c28566962aba08544fcaa9b

    SHA256

    1700841f881bf8f7aa3baa323b326c2ea538871f9bf4192cc1862f7c28aebb94

    SHA512

    f29001b45542b0a724c666cd885bed33172b756db2eee1ec23534b321d6a87edeaa026c1547711331cfe5bd42b707d91fd2324a7ac11c5b736299658b3859fe3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    68e9a69039c01d60dbbc9f1538d6222a

    SHA1

    df8a26eb3a1a854542dd98e71a07a31e40c5b1ff

    SHA256

    559957767e58cf62477510eb17715d92749fff8251b778f2619b3f946b695a12

    SHA512

    c43a2427882fe1782aa4a54165e32cb9583cc49c5e93ebca0fdfb7583df8e06f2cf44b234e2022441a73f5b4aa1862786bd1ef459aff1715d0a70af6ae80c0ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c53561faf1c7c097eef104def4bf8276

    SHA1

    98c11b7e7daf17d6ba54417645f21eab7e6595dd

    SHA256

    bc2bf338211afb4c682d991ca60ae36331650dd84b8ca89b92edf3290d21000c

    SHA512

    db72d4209ef06b131239100a9484f3830edc5562a26bd17823fd119043244e3893a906317cee4cee61fae401b3516566d1f9b3d27636753cf9c6908162be4aab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9106e6d82bfbaad82a090f72760787f3

    SHA1

    bea4744d107f335000065644a32b20fc5d7f17da

    SHA256

    da820bf160d84198caf498f316cffada5dd88a105b35e1e67d274cf0033c8485

    SHA512

    ac234679c92db3b9421324523d220175783383049697834e859bccd1fb0063a3c379aa00fac5358321ed1488a0287a3b90024eca7f4304a63f102d4df6a82722

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    576b2173ee38bf91cff021f545410cad

    SHA1

    633e396cabbbf922bc21215dea9d2e347fabdf55

    SHA256

    72117275845976be37e3708cf1f6a5a164b7e79492c570bb3b293db94e67d611

    SHA512

    76a685323d8da8ea43d18199b9596846eed134b4ea87cec713ae728799d807aa7fad04720fb6a8c934b43859f8c70b3f0a38d4dd7f773b41da8b65dc1072c5af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ff9e98da3458a8da431447b5706182c5

    SHA1

    ead3a59f21a78311bd7a70d9fc5bf526e8fb9596

    SHA256

    57fd6f382333dd711f9c511ea3f96d846bcde82c71d57c32825fdb8addd649e8

    SHA512

    2c9ab13dec3a1d3f5af2d86504911ac9f1f08b8889e5d40ba95575e7f195fce59dec6f4edae7dda86136c172b23218d2b243fb8b75a032f57cd581b5d15fa6a0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3fda2b148af4849e3d7f311b8734f4e2

    SHA1

    d8c624b4317a8ea92e937310e6f14fc6a240ee77

    SHA256

    44c7b44abbee54d456c47ad0e8ccc8ff07d84903e5afbbab9ed2f7c66f17e969

    SHA512

    e30652b356ca90aba2c5b7db79cc999c92e69c75df22bf8cb00d6d23d30801db2ad4676cbec0851030f8b0343df5b9c4575ba9d9d70afda60f67880dafdccc6e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    463f9af91da96925d46ed10b6508ec59

    SHA1

    a66c864d1b7ace5e68061ebe93940ae236e7f665

    SHA256

    62073f81dd5a3925c29a9084754f03ef406a73488314893af2899a5825798a66

    SHA512

    9ea6524811c8d02d4590cfb496d80c6893cf5a1107c7d2c7297914bad637f381ca2b9172285ed8f4456292e2dd0e5d42f0ca589ba14cd7247e2861530a17d35c

  • C:\Users\Admin\AppData\Local\Temp\CabFCB9.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarFD78.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Windows\SysWOW64\rundll32Srv.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/2668-20-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2668-25-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2668-24-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2668-23-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2668-22-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2784-4-0x0000000010000000-0x000000001003B000-memory.dmp

    Filesize

    236KB

  • memory/2784-2-0x0000000010000000-0x000000001003B000-memory.dmp

    Filesize

    236KB

  • memory/2784-6-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2784-12-0x0000000010000000-0x000000001003B000-memory.dmp

    Filesize

    236KB

  • memory/2784-0-0x0000000010000000-0x000000001003B000-memory.dmp

    Filesize

    236KB

  • memory/2832-11-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2832-10-0x0000000000230000-0x000000000023F000-memory.dmp

    Filesize

    60KB

  • memory/2832-16-0x0000000000240000-0x000000000026E000-memory.dmp

    Filesize

    184KB