Analysis

  • max time kernel
    131s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    10-03-2022 04:55

General

  • Target

    64e61504a3a8085ef0454000b85af56f5c299a3c1a3fcdb6a57d1dbc5609519d.exe

  • Size

    465KB

  • MD5

    5e70d1a7802b5063eed5d6fed1989fac

  • SHA1

    8bde6039ba52a525ed908f36b19ee14bcf81e642

  • SHA256

    64e61504a3a8085ef0454000b85af56f5c299a3c1a3fcdb6a57d1dbc5609519d

  • SHA512

    fb495fc449946cf979cb04e9fab726bd7cf98f857c9c09faadd66944bf031f465983b7e163b7203aae0d06ab3eac980c1124aea44d0ab1ff7ee4df2e17122175

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\64e61504a3a8085ef0454000b85af56f5c299a3c1a3fcdb6a57d1dbc5609519d.exe
    "C:\Users\Admin\AppData\Local\Temp\64e61504a3a8085ef0454000b85af56f5c299a3c1a3fcdb6a57d1dbc5609519d.exe"
    1⤵
    • Accesses Microsoft Outlook accounts
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Users\Admin\AppData\Local\Temp\64e61504a3a8085ef0454000b85af56f5c299a3c1a3fcdb6a57d1dbc5609519dSrv.exe
      C:\Users\Admin\AppData\Local\Temp\64e61504a3a8085ef0454000b85af56f5c299a3c1a3fcdb6a57d1dbc5609519dSrv.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:2172
      • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
        "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2304
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2684
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2684 CREDAT:17410 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:3840

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
    MD5

    5b97603af0fc8f1dd40fc69bd6ca89cf

    SHA1

    18d63dbde43a5bc700ae55b9a013c596021ccd13

    SHA256

    33d3f697332b0fc4e09540cb9dc622ac0675fb8b2733554d4c0199307774ab52

    SHA512

    2064f951456fe29693f2653c88d44c2e6644af1087abc0d0d87ee5b81aae4c68cb7b459672741fe2cf635feda7994695741ca066493d80b90c470289bacd8acd

  • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
    MD5

    5b97603af0fc8f1dd40fc69bd6ca89cf

    SHA1

    18d63dbde43a5bc700ae55b9a013c596021ccd13

    SHA256

    33d3f697332b0fc4e09540cb9dc622ac0675fb8b2733554d4c0199307774ab52

    SHA512

    2064f951456fe29693f2653c88d44c2e6644af1087abc0d0d87ee5b81aae4c68cb7b459672741fe2cf635feda7994695741ca066493d80b90c470289bacd8acd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    a6358390c67d49a9d6e454caf41c5905

    SHA1

    d5cdef9e72d601c9eb67aab7e2e8ec1a90b17d93

    SHA256

    77f18d3ffdbf0be368777e42b6c206cf84f0f0a4445dfa4308cb798ec1b09281

    SHA512

    8a5cea19cbb384147be989d30c02ec13793f5c0ab77ede76710a524dd2fc4c9488a0a0979ca16034da846175c71b7019e0f96ca91e2bb6e1c78c19fe2d3cffd5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    54ed59238164f1ee9231590e70aba4cb

    SHA1

    1493509a132963b07e5c9722848f94381aa2abab

    SHA256

    15c06f74a19f3200e7ee314314c1c593bf892e41cdba68ea090724e20cea8980

    SHA512

    67c3d7d3099b8c1f4b0df583c2859a5c1f582160ce0385d311cebba0f4ad42d15ba017579351b87117687f335882568610a3c3e2ba4a24c2ec27d9b427fa404c

  • C:\Users\Admin\AppData\Local\Temp\64e61504a3a8085ef0454000b85af56f5c299a3c1a3fcdb6a57d1dbc5609519dSrv.exe
    MD5

    5b97603af0fc8f1dd40fc69bd6ca89cf

    SHA1

    18d63dbde43a5bc700ae55b9a013c596021ccd13

    SHA256

    33d3f697332b0fc4e09540cb9dc622ac0675fb8b2733554d4c0199307774ab52

    SHA512

    2064f951456fe29693f2653c88d44c2e6644af1087abc0d0d87ee5b81aae4c68cb7b459672741fe2cf635feda7994695741ca066493d80b90c470289bacd8acd

  • C:\Users\Admin\AppData\Local\Temp\64e61504a3a8085ef0454000b85af56f5c299a3c1a3fcdb6a57d1dbc5609519dSrv.exe
    MD5

    5b97603af0fc8f1dd40fc69bd6ca89cf

    SHA1

    18d63dbde43a5bc700ae55b9a013c596021ccd13

    SHA256

    33d3f697332b0fc4e09540cb9dc622ac0675fb8b2733554d4c0199307774ab52

    SHA512

    2064f951456fe29693f2653c88d44c2e6644af1087abc0d0d87ee5b81aae4c68cb7b459672741fe2cf635feda7994695741ca066493d80b90c470289bacd8acd

  • memory/2172-133-0x0000000000400000-0x0000000000442000-memory.dmp
    Filesize

    264KB

  • memory/2304-135-0x00000000005B0000-0x00000000005B1000-memory.dmp
    Filesize

    4KB

  • memory/2304-136-0x0000000000400000-0x0000000000442000-memory.dmp
    Filesize

    264KB

  • memory/2304-137-0x0000000077A30000-0x0000000077BD3000-memory.dmp
    Filesize

    1.6MB