Analysis

  • max time kernel
    152s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-05-2022 19:16

General

  • Target

    ?????.exe

  • Size

    2.5MB

  • MD5

    a052585bd537be9cc554ef8147cae3d2

  • SHA1

    fb50c89c57650bf9003727aa6974a866ded99151

  • SHA256

    de6ed9cba3d9c5b84f0fb8bdd1937ac4e60e543aa83ccef180073022c385b20a

  • SHA512

    d32baed6a50535244763ab5365733fc07600ccc20da3a7516f1c534dbbc809541969eb7c42047d4226435fbb0327e43f77b4ea06c3b1d90df551c9177ca8ed63

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 4 IoCs
  • UPX packed file 29 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\_____.exe
    "C:\Users\Admin\AppData\Local\Temp\_____.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4072
    • C:\Users\Admin\AppData\Local\Temp\._cache______.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache______.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4520
      • C:\Users\Admin\AppData\Local\Temp\._cache______Srv.exe
        C:\Users\Admin\AppData\Local\Temp\._cache______Srv.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2596
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1448
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4128
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4128 CREDAT:17410 /prefetch:2
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:4580
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Executes dropped EXE
      PID:4860
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4304

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • C:\ProgramData\Synaptics\Synaptics.exe
    Filesize

    757KB

    MD5

    481c764242367047705c53751a7a6161

    SHA1

    7586315affe5833b0b02307d16836fcfc4389ccb

    SHA256

    c9703e8b16f9ad56637facb10bcfec9ac7d342fc98d5312fddede9de40f1bfae

    SHA512

    2b2e90c7af644087ae446502af96635453527a36c55273fefbc467678e6f59b42325015e5ec77d4ffc0954b899f2c6bf5ee4077ed7f37c894cc32616eb8f6bcd

  • C:\ProgramData\Synaptics\Synaptics.exe
    Filesize

    757KB

    MD5

    481c764242367047705c53751a7a6161

    SHA1

    7586315affe5833b0b02307d16836fcfc4389ccb

    SHA256

    c9703e8b16f9ad56637facb10bcfec9ac7d342fc98d5312fddede9de40f1bfae

    SHA512

    2b2e90c7af644087ae446502af96635453527a36c55273fefbc467678e6f59b42325015e5ec77d4ffc0954b899f2c6bf5ee4077ed7f37c894cc32616eb8f6bcd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    bd72dc52da415559c02553bb1e7bd3c3

    SHA1

    64e00d8ec1ecb62146f0a2349e9fab7e7cb48ac4

    SHA256

    ac706580ffcb98d6b28184b26f71eaca509846170a3dba74c2a48a646e8c8eed

    SHA512

    e6e90e6c60e0f1419a9c1ce4863f5ef93b03967c8e0a5ebe570e48556ff0bd097acfe43e25e10ec8f2a4377c134d9c1ccf233b89c1bdce0038a04ef869a82139

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    434B

    MD5

    c3cbd065ab826f8b86de0da01d4a5b1a

    SHA1

    f26e263fd745656035a3150a721a6ddfae41995f

    SHA256

    3f87ab9d94f6e3e3dda6ae749678a77b138849e8b874769523a56873505662d5

    SHA512

    41695ef60ff490cbf19c4c50b963a7026ab2e349609f108e7354a661b78bca60ba0c1eef516082a31de44f63b12f1b22832591647aa208646e2df967fda83c9d

  • C:\Users\Admin\AppData\Local\Temp\._cache______.exe
    Filesize

    1.8MB

    MD5

    91a2959f3751f74ef9e44daf482c84d1

    SHA1

    175367124a139c9c8852517ef0a29a632141bec2

    SHA256

    f2759e98c238c6c54c85402b32316208c0957b010422cea0372226bf7bc4db0a

    SHA512

    925612e74405071ecb778393754f3253acd9fcb6b2c299fd1a4975f03503af74a7b11e7f704c53e73bfd300fa5fe511898fd3a51d6f02018ba430844434cf0a8

  • C:\Users\Admin\AppData\Local\Temp\._cache______.exe
    Filesize

    1.8MB

    MD5

    91a2959f3751f74ef9e44daf482c84d1

    SHA1

    175367124a139c9c8852517ef0a29a632141bec2

    SHA256

    f2759e98c238c6c54c85402b32316208c0957b010422cea0372226bf7bc4db0a

    SHA512

    925612e74405071ecb778393754f3253acd9fcb6b2c299fd1a4975f03503af74a7b11e7f704c53e73bfd300fa5fe511898fd3a51d6f02018ba430844434cf0a8

  • C:\Users\Admin\AppData\Local\Temp\._cache______Srv.exe
    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • C:\Users\Admin\AppData\Local\Temp\._cache______Srv.exe
    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • C:\Users\Admin\AppData\Local\Temp\jiyrwyVt.xlsm
    Filesize

    17KB

    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • memory/1448-139-0x0000000000000000-mapping.dmp
  • memory/1448-143-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/2596-133-0x0000000000000000-mapping.dmp
  • memory/2596-142-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/4304-187-0x00007FFD67DB0000-0x00007FFD67DC0000-memory.dmp
    Filesize

    64KB

  • memory/4304-193-0x00007FFD655B0000-0x00007FFD655C0000-memory.dmp
    Filesize

    64KB

  • memory/4304-192-0x00007FFD655B0000-0x00007FFD655C0000-memory.dmp
    Filesize

    64KB

  • memory/4304-191-0x00007FFD67DB0000-0x00007FFD67DC0000-memory.dmp
    Filesize

    64KB

  • memory/4304-190-0x00007FFD67DB0000-0x00007FFD67DC0000-memory.dmp
    Filesize

    64KB

  • memory/4304-189-0x00007FFD67DB0000-0x00007FFD67DC0000-memory.dmp
    Filesize

    64KB

  • memory/4304-188-0x00007FFD67DB0000-0x00007FFD67DC0000-memory.dmp
    Filesize

    64KB

  • memory/4520-158-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/4520-184-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/4520-162-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/4520-164-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/4520-166-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/4520-168-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/4520-170-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/4520-172-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/4520-174-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/4520-176-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/4520-178-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/4520-180-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/4520-182-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/4520-160-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/4520-186-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/4520-130-0x0000000000000000-mapping.dmp
  • memory/4520-156-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/4520-154-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/4520-152-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/4520-150-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/4520-148-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/4520-146-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/4520-145-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/4520-144-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/4860-135-0x0000000000000000-mapping.dmp