Analysis

  • max time kernel
    4294196s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20220223-en
  • submitted
    08-03-2022 19:16

General

  • Target

    41924ff751f099b4d1dcf12999bf58e6ede7854f5a64a8c2873c9807be1ca85f.exe

  • Size

    313KB

  • MD5

    e53fccd8979a713d50247bd9b715a8c8

  • SHA1

    6d5c963ffd74b59b425ad2434db49e514073c353

  • SHA256

    41924ff751f099b4d1dcf12999bf58e6ede7854f5a64a8c2873c9807be1ca85f

  • SHA512

    e6894a2f75ac004462875e0831b02d2dd77ae1d2d12404c61ca72f53b66ede7d10fbb9e9c28b80e0b47a40454b1225eed0eaeb589d75ea86259f978b60dff048

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 3 IoCs
  • UPX packed file 12 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 3 IoCs
  • Drops file in System32 directory 62 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41924ff751f099b4d1dcf12999bf58e6ede7854f5a64a8c2873c9807be1ca85f.exe
    "C:\Users\Admin\AppData\Local\Temp\41924ff751f099b4d1dcf12999bf58e6ede7854f5a64a8c2873c9807be1ca85f.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1052
    • C:\Users\Admin\AppData\Local\Temp\41924ff751f099b4d1dcf12999bf58e6ede7854f5a64a8c2873c9807be1ca85fSrv.exe
      C:\Users\Admin\AppData\Local\Temp\41924ff751f099b4d1dcf12999bf58e6ede7854f5a64a8c2873c9807be1ca85fSrv.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:1060
      • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
        "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1688
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1520
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1520 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:820
    • C:\Users\Admin\AppData\Local\Temp\41924ff751f099b4d1dcf12999bf58e6ede7854f5a64a8c2873c9807be1ca85f.exe
      "C:\Users\Admin\AppData\Local\Temp\41924ff751f099b4d1dcf12999bf58e6ede7854f5a64a8c2873c9807be1ca85f.exe" /GetKeys WirelessKeyView0F763321
      2⤵
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1104
      • C:\Users\Admin\AppData\Local\Temp\41924ff751f099b4d1dcf12999bf58e6ede7854f5a64a8c2873c9807be1ca85fSrv.exe
        C:\Users\Admin\AppData\Local\Temp\41924ff751f099b4d1dcf12999bf58e6ede7854f5a64a8c2873c9807be1ca85fSrv.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:584
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1828
          • C:\Windows\System32\ie4uinit.exe
            "C:\Windows\System32\ie4uinit.exe" -ShowQLIcon
            5⤵
            • Drops file in System32 directory
            PID:972
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1828 CREDAT:275457 /prefetch:2
            5⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious use of SetWindowsHookEx
            PID:1320

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
    MD5

    5b97603af0fc8f1dd40fc69bd6ca89cf

    SHA1

    18d63dbde43a5bc700ae55b9a013c596021ccd13

    SHA256

    33d3f697332b0fc4e09540cb9dc622ac0675fb8b2733554d4c0199307774ab52

    SHA512

    2064f951456fe29693f2653c88d44c2e6644af1087abc0d0d87ee5b81aae4c68cb7b459672741fe2cf635feda7994695741ca066493d80b90c470289bacd8acd

  • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
    MD5

    5b97603af0fc8f1dd40fc69bd6ca89cf

    SHA1

    18d63dbde43a5bc700ae55b9a013c596021ccd13

    SHA256

    33d3f697332b0fc4e09540cb9dc622ac0675fb8b2733554d4c0199307774ab52

    SHA512

    2064f951456fe29693f2653c88d44c2e6644af1087abc0d0d87ee5b81aae4c68cb7b459672741fe2cf635feda7994695741ca066493d80b90c470289bacd8acd

  • C:\Users\Admin\AppData\Local\Temp\41924ff751f099b4d1dcf12999bf58e6ede7854f5a64a8c2873c9807be1ca85fSrv.exe
    MD5

    5b97603af0fc8f1dd40fc69bd6ca89cf

    SHA1

    18d63dbde43a5bc700ae55b9a013c596021ccd13

    SHA256

    33d3f697332b0fc4e09540cb9dc622ac0675fb8b2733554d4c0199307774ab52

    SHA512

    2064f951456fe29693f2653c88d44c2e6644af1087abc0d0d87ee5b81aae4c68cb7b459672741fe2cf635feda7994695741ca066493d80b90c470289bacd8acd

  • C:\Users\Admin\AppData\Local\Temp\41924ff751f099b4d1dcf12999bf58e6ede7854f5a64a8c2873c9807be1ca85fSrv.exe
    MD5

    5b97603af0fc8f1dd40fc69bd6ca89cf

    SHA1

    18d63dbde43a5bc700ae55b9a013c596021ccd13

    SHA256

    33d3f697332b0fc4e09540cb9dc622ac0675fb8b2733554d4c0199307774ab52

    SHA512

    2064f951456fe29693f2653c88d44c2e6644af1087abc0d0d87ee5b81aae4c68cb7b459672741fe2cf635feda7994695741ca066493d80b90c470289bacd8acd

  • C:\Users\Admin\AppData\Local\Temp\41924ff751f099b4d1dcf12999bf58e6ede7854f5a64a8c2873c9807be1ca85fSrv.exe
    MD5

    5b97603af0fc8f1dd40fc69bd6ca89cf

    SHA1

    18d63dbde43a5bc700ae55b9a013c596021ccd13

    SHA256

    33d3f697332b0fc4e09540cb9dc622ac0675fb8b2733554d4c0199307774ab52

    SHA512

    2064f951456fe29693f2653c88d44c2e6644af1087abc0d0d87ee5b81aae4c68cb7b459672741fe2cf635feda7994695741ca066493d80b90c470289bacd8acd

  • C:\Users\Admin\AppData\Local\Temp\41924ff751f099b4d1dcf12999bf58e6ede7854f5a64a8c2873c9807be1ca85fSrv.exe
    MD5

    5b97603af0fc8f1dd40fc69bd6ca89cf

    SHA1

    18d63dbde43a5bc700ae55b9a013c596021ccd13

    SHA256

    33d3f697332b0fc4e09540cb9dc622ac0675fb8b2733554d4c0199307774ab52

    SHA512

    2064f951456fe29693f2653c88d44c2e6644af1087abc0d0d87ee5b81aae4c68cb7b459672741fe2cf635feda7994695741ca066493d80b90c470289bacd8acd

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\IDKV8IYE.txt
    MD5

    c544798cb5aa83628348a0fc02e7fcac

    SHA1

    f9157cb289e4318ecb4b41e3443606627c58e5ef

    SHA256

    aa0bb0506df57cec858fdb91a3bb49b8c96c27fb91511ff4f2a958279c120fe0

    SHA512

    18591d7230d8d46de7ce186370d77199ebad5f271948696d17542b274759d75060c3ac9469b95ae86b498d0fdc1ba380689d88497d36b4300f5d09172ae5e7ca

  • \Program Files (x86)\Microsoft\DesktopLayer.exe
    MD5

    5b97603af0fc8f1dd40fc69bd6ca89cf

    SHA1

    18d63dbde43a5bc700ae55b9a013c596021ccd13

    SHA256

    33d3f697332b0fc4e09540cb9dc622ac0675fb8b2733554d4c0199307774ab52

    SHA512

    2064f951456fe29693f2653c88d44c2e6644af1087abc0d0d87ee5b81aae4c68cb7b459672741fe2cf635feda7994695741ca066493d80b90c470289bacd8acd

  • \Users\Admin\AppData\Local\Temp\41924ff751f099b4d1dcf12999bf58e6ede7854f5a64a8c2873c9807be1ca85fSrv.exe
    MD5

    5b97603af0fc8f1dd40fc69bd6ca89cf

    SHA1

    18d63dbde43a5bc700ae55b9a013c596021ccd13

    SHA256

    33d3f697332b0fc4e09540cb9dc622ac0675fb8b2733554d4c0199307774ab52

    SHA512

    2064f951456fe29693f2653c88d44c2e6644af1087abc0d0d87ee5b81aae4c68cb7b459672741fe2cf635feda7994695741ca066493d80b90c470289bacd8acd

  • \Users\Admin\AppData\Local\Temp\41924ff751f099b4d1dcf12999bf58e6ede7854f5a64a8c2873c9807be1ca85fSrv.exe
    MD5

    5b97603af0fc8f1dd40fc69bd6ca89cf

    SHA1

    18d63dbde43a5bc700ae55b9a013c596021ccd13

    SHA256

    33d3f697332b0fc4e09540cb9dc622ac0675fb8b2733554d4c0199307774ab52

    SHA512

    2064f951456fe29693f2653c88d44c2e6644af1087abc0d0d87ee5b81aae4c68cb7b459672741fe2cf635feda7994695741ca066493d80b90c470289bacd8acd

  • memory/584-72-0x0000000000240000-0x0000000000241000-memory.dmp
    Filesize

    4KB

  • memory/584-73-0x0000000000400000-0x0000000000442000-memory.dmp
    Filesize

    264KB

  • memory/584-74-0x0000000076F10000-0x0000000077090000-memory.dmp
    Filesize

    1.5MB

  • memory/1052-54-0x0000000074E61000-0x0000000074E63000-memory.dmp
    Filesize

    8KB

  • memory/1060-61-0x0000000000400000-0x0000000000442000-memory.dmp
    Filesize

    264KB

  • memory/1688-64-0x0000000000250000-0x0000000000251000-memory.dmp
    Filesize

    4KB

  • memory/1688-65-0x0000000000400000-0x0000000000442000-memory.dmp
    Filesize

    264KB

  • memory/1688-67-0x0000000076F10000-0x0000000077090000-memory.dmp
    Filesize

    1.5MB