Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24/01/2025, 08:51 UTC

General

  • Target

    JaffaCakes118_1fcf2a538f2708342acbfb01ce584b77.dll

  • Size

    272KB

  • MD5

    1fcf2a538f2708342acbfb01ce584b77

  • SHA1

    0c4d2ff956f0319261203ec2946235546f46e8c0

  • SHA256

    5c81f6cbe9028f358e71d67da0acc6fb14cee4d1f9d3e9996120c0f2cf69bf00

  • SHA512

    d821f64ae78a724d62c2b4097938c7c3bbc4e28a9ddc884d10b30c9085ad44debc17b46d86b0e9a069f133606d64f24b064ba79580e92c35796b9151037e1498

  • SSDEEP

    3072:261Ye3TaEu2CoCcn3zO7A4D8XHDfTGuwnh7BJz3gOu2RkEVae:rTa12CoCckAe8Dgt0Ol

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 3 IoCs
  • UPX packed file 13 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 37 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\smss.exe
    \SystemRoot\System32\smss.exe
    1⤵
      PID:256
    • C:\Windows\system32\csrss.exe
      %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
      1⤵
        PID:332
      • C:\Windows\system32\wininit.exe
        wininit.exe
        1⤵
          PID:384
          • C:\Windows\system32\services.exe
            C:\Windows\system32\services.exe
            2⤵
              PID:476
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k DcomLaunch
                3⤵
                  PID:604
                  • C:\Windows\system32\wbem\wmiprvse.exe
                    C:\Windows\system32\wbem\wmiprvse.exe
                    4⤵
                      PID:1680
                    • C:\Windows\system32\DllHost.exe
                      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                      4⤵
                        PID:800
                      • C:\Windows\system32\wbem\wmiprvse.exe
                        C:\Windows\system32\wbem\wmiprvse.exe -Embedding
                        4⤵
                          PID:1492
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k RPCSS
                        3⤵
                          PID:688
                        • C:\Windows\System32\svchost.exe
                          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
                          3⤵
                            PID:752
                          • C:\Windows\System32\svchost.exe
                            C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
                            3⤵
                              PID:820
                              • C:\Windows\system32\Dwm.exe
                                "C:\Windows\system32\Dwm.exe"
                                4⤵
                                  PID:1160
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k netsvcs
                                3⤵
                                  PID:856
                                  • \\?\C:\Windows\system32\wbem\WMIADAP.EXE
                                    wmiadap.exe /F /T /R
                                    4⤵
                                      PID:1820
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalService
                                    3⤵
                                      PID:972
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k NetworkService
                                      3⤵
                                        PID:284
                                      • C:\Windows\System32\spoolsv.exe
                                        C:\Windows\System32\spoolsv.exe
                                        3⤵
                                          PID:328
                                        • C:\Windows\system32\svchost.exe
                                          C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
                                          3⤵
                                            PID:1072
                                          • C:\Windows\system32\taskhost.exe
                                            "taskhost.exe"
                                            3⤵
                                              PID:1108
                                            • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
                                              "C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"
                                              3⤵
                                                PID:1500
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
                                                3⤵
                                                  PID:2548
                                                • C:\Windows\system32\sppsvc.exe
                                                  C:\Windows\system32\sppsvc.exe
                                                  3⤵
                                                    PID:2352
                                                • C:\Windows\system32\lsass.exe
                                                  C:\Windows\system32\lsass.exe
                                                  2⤵
                                                    PID:488
                                                  • C:\Windows\system32\lsm.exe
                                                    C:\Windows\system32\lsm.exe
                                                    2⤵
                                                      PID:496
                                                  • C:\Windows\system32\csrss.exe
                                                    %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
                                                    1⤵
                                                      PID:396
                                                    • C:\Windows\system32\winlogon.exe
                                                      winlogon.exe
                                                      1⤵
                                                        PID:432
                                                      • C:\Windows\Explorer.EXE
                                                        C:\Windows\Explorer.EXE
                                                        1⤵
                                                          PID:1192
                                                          • C:\Windows\system32\rundll32.exe
                                                            rundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1fcf2a538f2708342acbfb01ce584b77.dll,#1
                                                            2⤵
                                                            • Suspicious use of WriteProcessMemory
                                                            PID:2452
                                                            • C:\Windows\SysWOW64\rundll32.exe
                                                              rundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1fcf2a538f2708342acbfb01ce584b77.dll,#1
                                                              3⤵
                                                              • Loads dropped DLL
                                                              • Drops file in System32 directory
                                                              • System Location Discovery: System Language Discovery
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              • Suspicious use of WriteProcessMemory
                                                              PID:2880
                                                              • C:\Windows\SysWOW64\rundll32mgr.exe
                                                                C:\Windows\SysWOW64\rundll32mgr.exe
                                                                4⤵
                                                                • Executes dropped EXE
                                                                • Loads dropped DLL
                                                                • Drops file in Program Files directory
                                                                • System Location Discovery: System Language Discovery
                                                                • Suspicious use of UnmapMainImage
                                                                • Suspicious use of WriteProcessMemory
                                                                PID:2652
                                                                • C:\Program Files (x86)\Microsoft\WaterMark.exe
                                                                  "C:\Program Files (x86)\Microsoft\WaterMark.exe"
                                                                  5⤵
                                                                  • Executes dropped EXE
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  • Suspicious use of UnmapMainImage
                                                                  • Suspicious use of WriteProcessMemory
                                                                  PID:2120
                                                                  • C:\Windows\SysWOW64\svchost.exe
                                                                    C:\Windows\system32\svchost.exe
                                                                    6⤵
                                                                    • Modifies WinLogon for persistence
                                                                    • Drops file in System32 directory
                                                                    • Drops file in Program Files directory
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:2900
                                                                  • C:\Windows\SysWOW64\svchost.exe
                                                                    C:\Windows\system32\svchost.exe
                                                                    6⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    • Suspicious use of WriteProcessMemory
                                                                    PID:2968
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 2880 -s 224
                                                                4⤵
                                                                • Program crash
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:2816

                                                        Network

                                                        • flag-us
                                                          DNS
                                                          google.com
                                                          svchost.exe
                                                          Remote address:
                                                          8.8.8.8:53
                                                          Request
                                                          google.com
                                                          IN A
                                                          Response
                                                          google.com
                                                          IN A
                                                          172.217.169.46
                                                        • flag-us
                                                          DNS
                                                          rterybrstutnrsbberve.com
                                                          svchost.exe
                                                          Remote address:
                                                          8.8.8.8:53
                                                          Request
                                                          rterybrstutnrsbberve.com
                                                          IN A
                                                          Response
                                                          rterybrstutnrsbberve.com
                                                          IN A
                                                          34.253.216.9
                                                        • flag-us
                                                          DNS
                                                          erwbtkidthetcwerc.com
                                                          svchost.exe
                                                          Remote address:
                                                          8.8.8.8:53
                                                          Request
                                                          erwbtkidthetcwerc.com
                                                          IN A
                                                          Response
                                                          erwbtkidthetcwerc.com
                                                          IN A
                                                          34.253.216.9
                                                        • flag-us
                                                          DNS
                                                          rvbwtbeitwjeitv.com
                                                          svchost.exe
                                                          Remote address:
                                                          8.8.8.8:53
                                                          Request
                                                          rvbwtbeitwjeitv.com
                                                          IN A
                                                          Response
                                                          rvbwtbeitwjeitv.com
                                                          IN A
                                                          204.95.99.221
                                                        • flag-us
                                                          DNS
                                                          google.com
                                                          svchost.exe
                                                          Remote address:
                                                          8.8.8.8:53
                                                          Request
                                                          google.com
                                                          IN A
                                                          Response
                                                          google.com
                                                          IN A
                                                          172.217.169.46
                                                        • 91.220.62.30:443
                                                          svchost.exe
                                                          152 B
                                                          3
                                                        • 172.217.169.46:80
                                                          google.com
                                                          svchost.exe
                                                          98 B
                                                          52 B
                                                          2
                                                          1
                                                        • 91.220.62.30:443
                                                          svchost.exe
                                                          152 B
                                                          3
                                                        • 34.253.216.9:443
                                                          rterybrstutnrsbberve.com
                                                          https
                                                          svchost.exe
                                                          190 B
                                                          216 B
                                                          4
                                                          5
                                                        • 34.253.216.9:443
                                                          rterybrstutnrsbberve.com
                                                          https
                                                          svchost.exe
                                                          268 B
                                                          216 B
                                                          4
                                                          5
                                                        • 34.253.216.9:443
                                                          erwbtkidthetcwerc.com
                                                          https
                                                          svchost.exe
                                                          190 B
                                                          216 B
                                                          4
                                                          5
                                                        • 34.253.216.9:443
                                                          erwbtkidthetcwerc.com
                                                          https
                                                          svchost.exe
                                                          268 B
                                                          216 B
                                                          4
                                                          5
                                                        • 204.95.99.221:443
                                                          rvbwtbeitwjeitv.com
                                                          https
                                                          svchost.exe
                                                          558 B
                                                          132 B
                                                          12
                                                          3
                                                        • 204.95.99.221:443
                                                          rvbwtbeitwjeitv.com
                                                          https
                                                          svchost.exe
                                                          1.3kB
                                                          132 B
                                                          14
                                                          3
                                                        • 172.217.169.46:80
                                                          google.com
                                                          svchost.exe
                                                          98 B
                                                          52 B
                                                          2
                                                          1
                                                        • 172.217.169.46:80
                                                          google.com
                                                          svchost.exe
                                                          98 B
                                                          52 B
                                                          2
                                                          1
                                                        • 8.8.8.8:53
                                                          google.com
                                                          dns
                                                          svchost.exe
                                                          56 B
                                                          72 B
                                                          1
                                                          1

                                                          DNS Request

                                                          google.com

                                                          DNS Response

                                                          172.217.169.46

                                                        • 8.8.8.8:53
                                                          rterybrstutnrsbberve.com
                                                          dns
                                                          svchost.exe
                                                          70 B
                                                          86 B
                                                          1
                                                          1

                                                          DNS Request

                                                          rterybrstutnrsbberve.com

                                                          DNS Response

                                                          34.253.216.9

                                                        • 8.8.8.8:53
                                                          erwbtkidthetcwerc.com
                                                          dns
                                                          svchost.exe
                                                          67 B
                                                          83 B
                                                          1
                                                          1

                                                          DNS Request

                                                          erwbtkidthetcwerc.com

                                                          DNS Response

                                                          34.253.216.9

                                                        • 8.8.8.8:53
                                                          rvbwtbeitwjeitv.com
                                                          dns
                                                          svchost.exe
                                                          65 B
                                                          81 B
                                                          1
                                                          1

                                                          DNS Request

                                                          rvbwtbeitwjeitv.com

                                                          DNS Response

                                                          204.95.99.221

                                                        • 8.8.8.8:53
                                                          google.com
                                                          dns
                                                          svchost.exe
                                                          56 B
                                                          72 B
                                                          1
                                                          1

                                                          DNS Request

                                                          google.com

                                                          DNS Response

                                                          172.217.169.46

                                                        MITRE ATT&CK Enterprise v15

                                                        Replay Monitor

                                                        Loading Replay Monitor...

                                                        Downloads

                                                        • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html

                                                          Filesize

                                                          428KB

                                                          MD5

                                                          94fe4660585652f794b7e524c3588556

                                                          SHA1

                                                          da00f9f98253520ad2a8343ab9b8965ef5ba7d70

                                                          SHA256

                                                          719780cd46dc227b4204a88d876b02e363cdba0b629e0a90ea8b2a3e32aeb1c1

                                                          SHA512

                                                          2ee3d757e29dcf37aca7de35d8cefffc6ae86cbd7f882199c73f2b9813752346eff9dc26fee92b9dca4ac9b108db898a16ca8b2a0f687c5caba299bc3526a822

                                                        • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html

                                                          Filesize

                                                          424KB

                                                          MD5

                                                          7f7511423c71e1ec5fee704518f87578

                                                          SHA1

                                                          8f6bff29c7dd6ade023d816731019e025eca746a

                                                          SHA256

                                                          7cf68511497ff34f3f2435b51092816002da077cd68b7d5bbf3cc1d6b4043f47

                                                          SHA512

                                                          47634cecc799970f11524b984909152ed94dbd8c7786c0a81502772704865f3ecb980745098000d086e6eff3646f17194f35425f87ced2e4eaf57889d8e159c9

                                                        • \Windows\SysWOW64\rundll32mgr.exe

                                                          Filesize

                                                          207KB

                                                          MD5

                                                          d27fdd034caf68959b687174ef2ab8db

                                                          SHA1

                                                          5c1003a7383d8a9163efd9f1b30345d2ab6a49b8

                                                          SHA256

                                                          f5b72968cebc82ccce4cad4b1bad411e13dc29ee92d0133f4818f2de36d52b0c

                                                          SHA512

                                                          8750ffb67b6fa73078a99b5a2c7db8454885a3758e5813c3074689d3de0c23e4553d62ae092349aafeba863b54429d0a2fa6eea58b48d4d4576d1550c6cbc3f7

                                                        • memory/2120-40-0x00000000001F0000-0x00000000001F1000-memory.dmp

                                                          Filesize

                                                          4KB

                                                        • memory/2120-35-0x0000000000400000-0x000000000043F000-memory.dmp

                                                          Filesize

                                                          252KB

                                                        • memory/2120-41-0x0000000000400000-0x0000000000421000-memory.dmp

                                                          Filesize

                                                          132KB

                                                        • memory/2120-39-0x0000000000400000-0x0000000000421000-memory.dmp

                                                          Filesize

                                                          132KB

                                                        • memory/2120-42-0x000000007760F000-0x0000000077610000-memory.dmp

                                                          Filesize

                                                          4KB

                                                        • memory/2120-43-0x0000000020010000-0x0000000020022000-memory.dmp

                                                          Filesize

                                                          72KB

                                                        • memory/2120-72-0x0000000000060000-0x0000000000061000-memory.dmp

                                                          Filesize

                                                          4KB

                                                        • memory/2120-684-0x0000000000400000-0x0000000000421000-memory.dmp

                                                          Filesize

                                                          132KB

                                                        • memory/2120-88-0x0000000000400000-0x0000000000421000-memory.dmp

                                                          Filesize

                                                          132KB

                                                        • memory/2120-415-0x000000007760F000-0x0000000077610000-memory.dmp

                                                          Filesize

                                                          4KB

                                                        • memory/2652-21-0x0000000000400000-0x0000000000421000-memory.dmp

                                                          Filesize

                                                          132KB

                                                        • memory/2652-16-0x0000000000400000-0x000000000043F000-memory.dmp

                                                          Filesize

                                                          252KB

                                                        • memory/2652-11-0x0000000000400000-0x0000000000421000-memory.dmp

                                                          Filesize

                                                          132KB

                                                        • memory/2652-19-0x0000000000400000-0x0000000000421000-memory.dmp

                                                          Filesize

                                                          132KB

                                                        • memory/2652-18-0x0000000000400000-0x0000000000421000-memory.dmp

                                                          Filesize

                                                          132KB

                                                        • memory/2652-17-0x00000000001C0000-0x00000000001C1000-memory.dmp

                                                          Filesize

                                                          4KB

                                                        • memory/2652-14-0x0000000000400000-0x0000000000421000-memory.dmp

                                                          Filesize

                                                          132KB

                                                        • memory/2652-13-0x0000000000400000-0x0000000000421000-memory.dmp

                                                          Filesize

                                                          132KB

                                                        • memory/2652-12-0x0000000000400000-0x0000000000421000-memory.dmp

                                                          Filesize

                                                          132KB

                                                        • memory/2880-7-0x000000006D100000-0x000000006D144000-memory.dmp

                                                          Filesize

                                                          272KB

                                                        • memory/2880-8-0x000000006D100000-0x000000006D144000-memory.dmp

                                                          Filesize

                                                          272KB

                                                        • memory/2880-421-0x000000006D100000-0x000000006D144000-memory.dmp

                                                          Filesize

                                                          272KB

                                                        • memory/2880-9-0x0000000000240000-0x000000000027F000-memory.dmp

                                                          Filesize

                                                          252KB

                                                        • memory/2900-66-0x00000000000C0000-0x00000000000C1000-memory.dmp

                                                          Filesize

                                                          4KB

                                                        • memory/2900-59-0x0000000020010000-0x0000000020022000-memory.dmp

                                                          Filesize

                                                          72KB

                                                        • memory/2900-54-0x0000000020010000-0x0000000020022000-memory.dmp

                                                          Filesize

                                                          72KB

                                                        • memory/2900-68-0x0000000020010000-0x0000000020022000-memory.dmp

                                                          Filesize

                                                          72KB

                                                        • memory/2900-46-0x00000000000C0000-0x00000000000C1000-memory.dmp

                                                          Filesize

                                                          4KB

                                                        • memory/2900-44-0x0000000020010000-0x0000000020022000-memory.dmp

                                                          Filesize

                                                          72KB

                                                        • memory/2900-67-0x00000000000D0000-0x00000000000D1000-memory.dmp

                                                          Filesize

                                                          4KB

                                                        • memory/2900-65-0x00000000000E0000-0x00000000000E1000-memory.dmp

                                                          Filesize

                                                          4KB

                                                        • memory/2900-418-0x0000000020010000-0x0000000020022000-memory.dmp

                                                          Filesize

                                                          72KB

                                                        • memory/2968-87-0x0000000020010000-0x000000002001B000-memory.dmp

                                                          Filesize

                                                          44KB

                                                        • memory/2968-90-0x0000000020010000-0x000000002001B000-memory.dmp

                                                          Filesize

                                                          44KB

                                                        • memory/2968-89-0x00000000000F0000-0x00000000000F1000-memory.dmp

                                                          Filesize

                                                          4KB

                                                        • memory/2968-91-0x0000000020010000-0x000000002001B000-memory.dmp

                                                          Filesize

                                                          44KB

                                                        • memory/2968-92-0x0000000000100000-0x0000000000101000-memory.dmp

                                                          Filesize

                                                          4KB

                                                        • memory/2968-93-0x0000000020010000-0x000000002001B000-memory.dmp

                                                          Filesize

                                                          44KB

                                                        • memory/2968-94-0x0000000077610000-0x0000000077611000-memory.dmp

                                                          Filesize

                                                          4KB

                                                        • memory/2968-83-0x0000000020010000-0x000000002001B000-memory.dmp

                                                          Filesize

                                                          44KB

                                                        • memory/2968-74-0x0000000020010000-0x000000002001B000-memory.dmp

                                                          Filesize

                                                          44KB

                                                        We care about your privacy.

                                                        This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.