Analysis
-
max time kernel
124s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
12-03-2022 08:43
Static task
static1
Behavioral task
behavioral1
Sample
RAMN.vbs
Resource
win7-20220310-en
General
-
Target
RAMN.vbs
-
Size
169KB
-
MD5
e5e7f440ae47fe295bb93034b1edf3c1
-
SHA1
bff968fb18c296edabf8ad52953e7c36ae0bcdea
-
SHA256
2a5fcd571c34b11c0c630c8cf1f50a91a136e931e0057f7f8e3ca36ecd73d993
-
SHA512
a45c68efa11bf061c5ed5fd09e2c616acb2333b67cb1f86382eac88ac1f2fb1120ad2517381e2125eb5a98a5d69d602918cc1ac1277cee1f5a976d8e1a3eb92b
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List svchost.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile svchost.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications svchost.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\svchost.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe:*:enabled:@shell32.dll,-1" svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
svchost.exepid process 4304 svchost.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\svchost.exe upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1180 4304 WerFault.exe svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
svchost.exepid process 4304 svchost.exe 4304 svchost.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
Processes:
svchost.exepid process 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe 4304 svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid process Token: SeDebugPrivilege 4304 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
WScript.exesvchost.exedescription pid process target process PID 3100 wrote to memory of 4304 3100 WScript.exe svchost.exe PID 3100 wrote to memory of 4304 3100 WScript.exe svchost.exe PID 3100 wrote to memory of 4304 3100 WScript.exe svchost.exe PID 4304 wrote to memory of 624 4304 svchost.exe winlogon.exe PID 4304 wrote to memory of 624 4304 svchost.exe winlogon.exe PID 4304 wrote to memory of 624 4304 svchost.exe winlogon.exe PID 4304 wrote to memory of 624 4304 svchost.exe winlogon.exe PID 4304 wrote to memory of 624 4304 svchost.exe winlogon.exe PID 4304 wrote to memory of 624 4304 svchost.exe winlogon.exe PID 4304 wrote to memory of 680 4304 svchost.exe lsass.exe PID 4304 wrote to memory of 680 4304 svchost.exe lsass.exe PID 4304 wrote to memory of 680 4304 svchost.exe lsass.exe PID 4304 wrote to memory of 680 4304 svchost.exe lsass.exe PID 4304 wrote to memory of 680 4304 svchost.exe lsass.exe PID 4304 wrote to memory of 680 4304 svchost.exe lsass.exe PID 4304 wrote to memory of 796 4304 svchost.exe svchost.exe PID 4304 wrote to memory of 796 4304 svchost.exe svchost.exe PID 4304 wrote to memory of 796 4304 svchost.exe svchost.exe PID 4304 wrote to memory of 796 4304 svchost.exe svchost.exe PID 4304 wrote to memory of 796 4304 svchost.exe svchost.exe PID 4304 wrote to memory of 796 4304 svchost.exe svchost.exe PID 4304 wrote to memory of 804 4304 svchost.exe fontdrvhost.exe PID 4304 wrote to memory of 804 4304 svchost.exe fontdrvhost.exe PID 4304 wrote to memory of 804 4304 svchost.exe fontdrvhost.exe PID 4304 wrote to memory of 804 4304 svchost.exe fontdrvhost.exe PID 4304 wrote to memory of 804 4304 svchost.exe fontdrvhost.exe PID 4304 wrote to memory of 804 4304 svchost.exe fontdrvhost.exe PID 4304 wrote to memory of 812 4304 svchost.exe fontdrvhost.exe PID 4304 wrote to memory of 812 4304 svchost.exe fontdrvhost.exe PID 4304 wrote to memory of 812 4304 svchost.exe fontdrvhost.exe PID 4304 wrote to memory of 812 4304 svchost.exe fontdrvhost.exe PID 4304 wrote to memory of 812 4304 svchost.exe fontdrvhost.exe PID 4304 wrote to memory of 812 4304 svchost.exe fontdrvhost.exe PID 4304 wrote to memory of 916 4304 svchost.exe svchost.exe PID 4304 wrote to memory of 916 4304 svchost.exe svchost.exe PID 4304 wrote to memory of 916 4304 svchost.exe svchost.exe PID 4304 wrote to memory of 916 4304 svchost.exe svchost.exe PID 4304 wrote to memory of 916 4304 svchost.exe svchost.exe PID 4304 wrote to memory of 916 4304 svchost.exe svchost.exe PID 4304 wrote to memory of 968 4304 svchost.exe svchost.exe PID 4304 wrote to memory of 968 4304 svchost.exe svchost.exe PID 4304 wrote to memory of 968 4304 svchost.exe svchost.exe PID 4304 wrote to memory of 968 4304 svchost.exe svchost.exe PID 4304 wrote to memory of 968 4304 svchost.exe svchost.exe PID 4304 wrote to memory of 968 4304 svchost.exe svchost.exe PID 4304 wrote to memory of 400 4304 svchost.exe dwm.exe PID 4304 wrote to memory of 400 4304 svchost.exe dwm.exe PID 4304 wrote to memory of 400 4304 svchost.exe dwm.exe PID 4304 wrote to memory of 400 4304 svchost.exe dwm.exe PID 4304 wrote to memory of 400 4304 svchost.exe dwm.exe PID 4304 wrote to memory of 400 4304 svchost.exe dwm.exe PID 4304 wrote to memory of 392 4304 svchost.exe svchost.exe PID 4304 wrote to memory of 392 4304 svchost.exe svchost.exe PID 4304 wrote to memory of 392 4304 svchost.exe svchost.exe PID 4304 wrote to memory of 392 4304 svchost.exe svchost.exe PID 4304 wrote to memory of 392 4304 svchost.exe svchost.exe PID 4304 wrote to memory of 392 4304 svchost.exe svchost.exe PID 4304 wrote to memory of 696 4304 svchost.exe svchost.exe PID 4304 wrote to memory of 696 4304 svchost.exe svchost.exe PID 4304 wrote to memory of 696 4304 svchost.exe svchost.exe PID 4304 wrote to memory of 696 4304 svchost.exe svchost.exe PID 4304 wrote to memory of 696 4304 svchost.exe svchost.exe PID 4304 wrote to memory of 696 4304 svchost.exe svchost.exe PID 4304 wrote to memory of 964 4304 svchost.exe svchost.exe
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:680
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:624
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:804
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:400
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:796
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3456
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:3544
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3688
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:3392
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3304
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3812
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:4088
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:3380
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:692
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:812
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:968
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:916
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:392
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:696
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:964
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1052
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1064
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:3004
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1104
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1172
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1280
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1556
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1652
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1932
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:2040
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2080
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:2400
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2496
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2944
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3088
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:676
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RAMN.vbs"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Modifies firewall policy service
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 4884⤵
- Program crash
PID:1180
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵PID:3804
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:4708
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:4904
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:4292
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵PID:5060
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:4796
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2912
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2508
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2488
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2464
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2420
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2292
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2284
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2164
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:2156
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2072
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1920
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1988
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1952
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1804
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1792
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1668
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s FontCache1⤵PID:1660
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1604
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1456
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1444
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1428
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1288
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4304 -ip 43041⤵PID:460
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeMD5
df455f0fa8fb3fa4e6699ad57ef54db6
SHA151a06248c251d614d3a81ac9d842ba807204d17c
SHA25615068b86edc0473a4f96f109830318e0540af348197e2b65f2e90ff32cfb14a1
SHA512f69dea5b68e4fc8737fc0e6ef48476d3ed0a5ebd2f9dccc9d966df137f9ffdbb51e413a0852c22399afab53ea8a2755664afdcee6897a1cf387a9a620481b2a6
-
memory/4304-134-0x0000000077CB0000-0x0000000077E53000-memory.dmpFilesize
1.6MB