Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25/01/2025, 08:45

General

  • Target

    df6a4d5c413471913c0f7c785a8073f41ac0824174209d40f70b56adddf37089N.exe

  • Size

    1.5MB

  • MD5

    d92e33336041008bf7b74c22e1809fe0

  • SHA1

    2e729a9125574bd1c002320db1a22d5ab0dfeb4b

  • SHA256

    df6a4d5c413471913c0f7c785a8073f41ac0824174209d40f70b56adddf37089

  • SHA512

    dae4f4783e85ded8eaf8948761fd8c8979d5e6547f7f961eca7b6dd5a44e97896a33cd2798c0df694e05c04bc23c10180cb3b3fcb9cff3f03787fc2ae20badf0

  • SSDEEP

    24576:9Au5g2JdHjG1jcfJjdywpTsvTo3gDsUR/iiG3F/Bw2jKk3cif6RIKWX:FbTDG1jcxjIwpTcNDsUxi/Jwe1cii2K

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df6a4d5c413471913c0f7c785a8073f41ac0824174209d40f70b56adddf37089N.exe
    "C:\Users\Admin\AppData\Local\Temp\df6a4d5c413471913c0f7c785a8073f41ac0824174209d40f70b56adddf37089N.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2072
    • C:\Users\Admin\AppData\Local\Temp\df6a4d5c413471913c0f7c785a8073f41ac0824174209d40f70b56adddf37089NSrv.exe
      C:\Users\Admin\AppData\Local\Temp\df6a4d5c413471913c0f7c785a8073f41ac0824174209d40f70b56adddf37089NSrv.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3032
      • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
        "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1932
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2112
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2112 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    62807dce50546ed50fcf6394aa70ca9f

    SHA1

    7231a9a451ec8eb3c1c67bf9ebc76ada28fac5fc

    SHA256

    60961550af3d733bd2e780dcd6b25cc821748d094bc2240e37393c567aa727aa

    SHA512

    52c7196311f1e6de54457e95c7f949cc7c464fa67c27c3b37a0928e160ff8545fd6ba36a5fe184c9ee8dbbd1f5e00bbebfe9b801a2434cfb32129599a081b2ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3f2548b348f42935f1b81f3c3c2a9395

    SHA1

    9a57f538fb9661d55a6dc4222903464143934fe6

    SHA256

    d92758ac5383429cb4a80848256e246fc4dde814faa2049a238d50324872ef0c

    SHA512

    f6adaf8075f87f4aaca1bdb7a00611b862c12ccc2f5c9b47c043c384abcd5d7c95964de762f0d64532865316481648eb64af3c6f3d2ebf6f5149cfdd1ccca9b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fee686b9347d76e63344bfb7efdebbc2

    SHA1

    70383b8451986f7853baefe519d369b58746d417

    SHA256

    7d6a657d00dd208a7667169782ccf82b71ae750148fa49c5c0a0b9214b77894a

    SHA512

    f9a76d588cc6aa74b8767c43046446652499856bdb0267a1089910fae0100f42ba422310fb555fc0224e8527a59ccc032ff468fb89c75a8bc213ac8cb8074e5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fca1a484438dd5c9d52d8c2d1b1588c2

    SHA1

    2431304e13e0ab7bf0dc93c9668cbdcf33446550

    SHA256

    33f5bff273c17addf5fbce70fef16f940f4d092c287cc7ff938c984759c16722

    SHA512

    7ce266b39805d934c0e4ec38b7928eadc09e5bea87b4d59761b28bcc0332b44f5967230cddf61663b887f284cfd5fdb292bf9f5daa1aa9b7452b9f482f263e05

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    07fc4c32b0ef0b518d2672a2d64935c8

    SHA1

    33a8e5da504e059436178de3ac7ad8b29b919c83

    SHA256

    ea89334f5f080799ec10866984d1e42256eac459a4d8151f79f5f8aa819c4b9a

    SHA512

    b58b31ac6e54c134bd8ca8a3842c6643f1d6c040c960c744f8cae336e9033458524dc51ad57bebd8aaca2ef58a535264911f635365b96dd08799f30f4df608cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ce57a8e5242a765747178e34479a807d

    SHA1

    ebd370078270b48039dd7b0904721ae46ad8e246

    SHA256

    4a61d7d7b8cdab591bd7d8600a07a273bf4bbddecdd5cce3e6f5da4df519d104

    SHA512

    d3c80101bf45ac6cf3b9eeb6c2bb2f559619e6b61646f432786248858af186cb83e98d90fc18718da54bbbd6c45e853a144a46d03e2e865874652923452c36d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    29233ddfbb879f3edc48e50d87ad8e95

    SHA1

    1c2152f3b2477cfeee3a53d0d6ca624a48a2e831

    SHA256

    c43992240ed55191ece6ce93390fe366f1db81364dddeccffc2575e8a7e496ef

    SHA512

    2a0f9099fad67725a36e6fb53c29161f3be262cc7735d1d4c2c98514f1d60a151dd771d1d52f25eeae0d543107ddc0d37e6c8aa8ee9f66a79e0961b14f4f0130

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5cfc6498034683be277f7d890d492d24

    SHA1

    fcf42fea7d06ff7108562afef245be01f09d8b18

    SHA256

    a4a17c127480aa39de394add9616fbae3efccc8729e80754eac9683eb561d795

    SHA512

    9c539ecac36e6a6f2e7cc86e48120939a3da1944b3921a50278f3ffc96aecdcba0e0cc7f5fd007f12ae5d6eaeeab5a74de73da9f7612bebbc91cf04ff72919ee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    749cda282a6b6b3caf72ee56b86ad402

    SHA1

    2d0b3752f77b1286ffb1323125e89ef74f45ab63

    SHA256

    43da4e22b115654ef604257fc4bcc2c9b7e50e5782168c17369f26fdbe0400b9

    SHA512

    6d990055c9006e01e340f7379935d5ea28fd83856a1b5dbcdf46cdd9d55a98df2ec93df4133d1e87c352cbc6f87081cdb0625bfd6b13e569620a21cb0aa6c3cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a86fd65f3bda6ec13d8a3b1e8df79503

    SHA1

    39d6ac0c75ef75f30e4eb16da62584fbc3dc3a31

    SHA256

    97892773990bab43fb18924a248358c121055eeaace3d14a94e5f221105fd57f

    SHA512

    d49bf914d5e396ccb59dd9be08a186db7dacd99053ca43bdf490c45fcb55b149c5134343597910d2dfaa1549162a1f6625e515727e524eead1851a02fe33a60e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b47c6fb33199ac220511d4f08ab9c847

    SHA1

    126041d3d5213a63cf9eda0d4b31951830c782a2

    SHA256

    3b1e3c5ebd05114269d38c9e7a2bf5d0a4a227fda8251508594ec20f037b4ff4

    SHA512

    a505aa092fb50f19e321d28d9c35761d4d807da6678b720ad63d05f2fbe85114bb05b5500466123454f2f45499a41133e6a347440f886da1e9e543a874d7e6d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f0727f73da61280c56af3d18522b913e

    SHA1

    a9cae24e5b93308df2dd743f3c1a2d279769187a

    SHA256

    df0c5792e993670153d83963f181f17e64867518d0cdb840b4bc1002176f726c

    SHA512

    3c2f904cfde9a2b802a1ae895856309fb745060094761e724583b4c602e0d504517b5bf62a5035ac9c3f4205af6d3f9f142373e71b35c0fc23ce95130b0e7eee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    497c1a96e84f70c0ab9f156941a7d949

    SHA1

    4255c7e30cd9fcfd795a8bb098520599455142bc

    SHA256

    463f7e61408bb56f66a80eed1d3e9531fdb4eb4846bc435487b40fb7f6c92e6b

    SHA512

    01985619c17044fe09f866ad7cad0580e89727572ffd5a387be96177f8b60535cbd1cf4f5290daed5d989841a155d2804e6e3a81e12f1ede5edc3f667ae8c67b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f9f15f0877f1ddbf86beaa20a07cfa7b

    SHA1

    c87a4606d3fae70de208ebf1bbf0c44bb93a5677

    SHA256

    0a4f04300aaa2e6191cb806ce1f62d4c63d12bdd6a2a8d5ad86c22a7a8202a41

    SHA512

    cab2955d892912b8581670b64932857a25e8a5b5f2f6c6c17982f65ae8c8629d9e02e7dedad2a95c2e2cc4a8fdabdb07dfb7f42bbe694cee7fa326966ed81c1a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a73935eed363c7908301d9f2b0687180

    SHA1

    e7243b9ffd4c2e6d93b9222fc5f7eebb28ef381f

    SHA256

    f7de0eaf08f094eb296b5ea205a0326b48da0e11023dbb9c446e2cd65a4055f3

    SHA512

    04be74efbd4f70a8d8a6f9e2dbd10e299f49986bed4d7ddf3a636fd4b6a0f1c4c5232daf35095e24f6f31c9cd80ca9c651759d463abd8a9e4a3754ada77eb19c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e0772d0c6854969db2dfdbf6134c528d

    SHA1

    5e2440aef5a59b8c7e697aba70d79b7ee915cf92

    SHA256

    2ae255ada514d4e5d2165b18e49daadc1acd0009652d94f4b46a8380f6bc7231

    SHA512

    1008f7dae41fb24fc8eb3f1f7c73b54906ef2f48b5383d3136f3e8e8c281f6a06e9f89447ef71f6a90f9443585f8a15308ddee2e36ae6442e4dbf17556d3fb75

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dc29c89f3d369f1dc8bb654f69760c0b

    SHA1

    03b3f3215259c8c87f71167ce910a9b1968301f5

    SHA256

    5d495ae5f830edbbe927ffee57c95201226675c8823db41aed60ad2d0d1ac246

    SHA512

    8cc18530a39cdf96ce20917820cc97297a203ce2830b375b1e207811adcade6102d7a5d62ffed670825989e9c01d06b4128e8297be8f95c408fa385a7a24fff1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    db94b2932d0c7eef2fcbfe584f3c216e

    SHA1

    e8e70df73e8ac7cd51456ee4affe4a5fb5570b00

    SHA256

    f5653c85ce5d137ef319334905f8d1e86194499073557ecd28c2f14ae3ab76b0

    SHA512

    5978f4786a928a736f98947099ababe837f1c76f2e3c88f5e6cae0a478477b675f9e0054171fdc6f8b557b5a35962a3b54ef4d16e0abf84b976febe566bdc045

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    04ff5368110080c8ddbdec1393912d26

    SHA1

    5b208abee8ae515ab69ade018e7ac22657f57792

    SHA256

    c0086915c7c338d87c80ab14ae9b271b0314fff6fd79b6dd00027890323f4e1b

    SHA512

    903044656eeab8c194d8df01556029e8e0f64a4f82abc74631898cc60c2e353a0b1787e7e1b37a43d3cd14d1915db941d1cc60e999603c83eb3eef6c641fd5ab

  • C:\Users\Admin\AppData\Local\Temp\CabCEE5.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarCF95.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\df6a4d5c413471913c0f7c785a8073f41ac0824174209d40f70b56adddf37089NSrv.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/1932-18-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/1932-20-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2072-6-0x00000000003B0000-0x00000000003DE000-memory.dmp

    Filesize

    184KB

  • memory/2072-0-0x0000000000400000-0x000000000083C000-memory.dmp

    Filesize

    4.2MB

  • memory/2072-15-0x0000000000400000-0x000000000083C000-memory.dmp

    Filesize

    4.2MB

  • memory/2072-21-0x0000000000400000-0x000000000083C000-memory.dmp

    Filesize

    4.2MB

  • memory/3032-7-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/3032-14-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB