Analysis

  • max time kernel
    110s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    24-06-2022 22:31

General

  • Target

    f1b3cdb88dc7c0e76dbd184bf09ff664b704829b0e8a0f57c052be6aad58f45f.exe

  • Size

    107KB

  • MD5

    2032e13fd7f683d360b6f3fbc7e01b04

  • SHA1

    67cfb2b13147f183017e7d3b224388642aa151b0

  • SHA256

    f1b3cdb88dc7c0e76dbd184bf09ff664b704829b0e8a0f57c052be6aad58f45f

  • SHA512

    bbf5aeb4252ae78d9379882133cb4c7dbef196ec47f2f62954f1b5072d0bd52489db33a1f158fa9b157f0595914f4d684e8f96220137baefe07b2920094a71ec

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Kills process with taskkill 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f1b3cdb88dc7c0e76dbd184bf09ff664b704829b0e8a0f57c052be6aad58f45f.exe
    "C:\Users\Admin\AppData\Local\Temp\f1b3cdb88dc7c0e76dbd184bf09ff664b704829b0e8a0f57c052be6aad58f45f.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1524
    • C:\Users\Admin\AppData\Local\Temp\f1b3cdb88dc7c0e76dbd184bf09ff664b704829b0e8a0f57c052be6aad58f45fSrv.exe
      C:\Users\Admin\AppData\Local\Temp\f1b3cdb88dc7c0e76dbd184bf09ff664b704829b0e8a0f57c052be6aad58f45fSrv.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:1868
      • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
        "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1720
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1712
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1712 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1756
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\8D23.tmp\vivo¹¤¾ß.bat" "C:\Users\Admin\AppData\Local\Temp\f1b3cdb88dc7c0e76dbd184bf09ff664b704829b0e8a0f57c052be6aad58f45f.exe""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:952
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /im .╨┤╚δ╣ñ╛▀-╡Ñ╗·░µ2.0.exe /f
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:340
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /im opDLL.exe /f
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1908
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /im QserIMEI.exe /f
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1352
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /im .╕▀═¿SN╣ñ╛▀ ╝╙├▄╣╖░µ.exe /f
        3⤵
        • Kills process with taskkill
        PID:1528

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • C:\Users\Admin\AppData\Local\Temp\8D23.tmp\vivo¹¤¾ß.bat
    Filesize

    198B

    MD5

    9276553bed052b4d859fbd44c24f7537

    SHA1

    57bdbf113abaa02de848397f98440006e16af1b4

    SHA256

    e0fab13ebd90aecf0ff954a33ff825606fb9d5249c752d359f3021d3f8aa1ef6

    SHA512

    038a555bc8c166d58289d265a4cf59b9999f6399554618316480e5d15ed57fad1697e11d8f610f99785475295a18419428ec34851b1c6fa11d22c880d74363ac

  • C:\Users\Admin\AppData\Local\Temp\f1b3cdb88dc7c0e76dbd184bf09ff664b704829b0e8a0f57c052be6aad58f45fSrv.exe
    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • C:\Users\Admin\AppData\Local\Temp\f1b3cdb88dc7c0e76dbd184bf09ff664b704829b0e8a0f57c052be6aad58f45fSrv.exe
    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\RZVU1RNW.txt
    Filesize

    603B

    MD5

    aa601fa9295a0931246eabca0faf2f97

    SHA1

    a2fc59bbf7876647c5cbb07ea027d29f2464eee2

    SHA256

    a22f6bd6b7f0be38bbe21d50f2f89ed5b305a47979f6ee0e27b2c3a1af502236

    SHA512

    c2a423ea93a45e2d5c59a84641d4d5d6430d0ae46f43dca2bb3a90d67864055223f7bd5a163e8c06c981788a322f462c6715fe23c9e15c18a79e6c14b0a494d5

  • \Program Files (x86)\Microsoft\DesktopLayer.exe
    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • \Users\Admin\AppData\Local\Temp\f1b3cdb88dc7c0e76dbd184bf09ff664b704829b0e8a0f57c052be6aad58f45fSrv.exe
    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/340-74-0x0000000000000000-mapping.dmp
  • memory/952-71-0x0000000000000000-mapping.dmp
  • memory/1352-76-0x0000000000000000-mapping.dmp
  • memory/1524-61-0x0000000000250000-0x000000000027E000-memory.dmp
    Filesize

    184KB

  • memory/1524-54-0x0000000076851000-0x0000000076853000-memory.dmp
    Filesize

    8KB

  • memory/1524-72-0x0000000000400000-0x000000000041F000-memory.dmp
    Filesize

    124KB

  • memory/1524-60-0x0000000000400000-0x000000000041F000-memory.dmp
    Filesize

    124KB

  • memory/1528-77-0x0000000000000000-mapping.dmp
  • memory/1720-68-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/1720-63-0x0000000000000000-mapping.dmp
  • memory/1720-70-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/1868-65-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/1868-67-0x0000000000230000-0x000000000023F000-memory.dmp
    Filesize

    60KB

  • memory/1868-56-0x0000000000000000-mapping.dmp
  • memory/1908-75-0x0000000000000000-mapping.dmp