Analysis

  • max time kernel
    109s
  • max time network
    185s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    30/10/2022, 23:17

General

  • Target

    262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5.exe

  • Size

    322KB

  • MD5

    910159ab6797ef989d76a01b898bd390

  • SHA1

    f05f392337d44c50611fc12e1dbc6f72a51d5094

  • SHA256

    262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5

  • SHA512

    0d7ff99442050c1106dd828309c05fc4040877d4579bc29a19b534dc79b659cd89a77c1b6caf734c5f4866dc42d2ca8ee6c183542163811b16788efb05cf8bb2

  • SSDEEP

    6144:S5BgvadeLnJiYZ+up5BmmbKaRwmNN5+Scc9PoXI0l4Bp/rZl+2v12:S//miwZ/JKjJGwXI9pTL+kM

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 53 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5.exe
    "C:\Users\Admin\AppData\Local\Temp\262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1480
    • C:\Users\Admin\AppData\Local\Temp\262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5mgr.exe
      C:\Users\Admin\AppData\Local\Temp\262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5mgr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:836
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1700
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1700 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1460
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:956
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:956 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1464
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2020

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{261AF6D1-594B-11ED-BD75-FAF5FAF3A79A}.dat

      Filesize

      3KB

      MD5

      44f10063f817a3234fa5003076935441

      SHA1

      84b2064aec144042eae5f7316a948b4dbba7aee8

      SHA256

      e94b5834b14feb9ea7b27aa93c156b988cd8049bac6404d7faf3ed6b16539d34

      SHA512

      9b7cd1d3810956f8d7cd267f10de059f78337dfe52e99b5c742c656a551cfcf6c9190d490cb17c89290e6360d2f7cbf8d5bbfa4d3cef259d320bbb3a2aad1cbe

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{261B1DE1-594B-11ED-BD75-FAF5FAF3A79A}.dat

      Filesize

      3KB

      MD5

      747c61fb5662eee8935feef97b9fa9f0

      SHA1

      7d884ea6b76e0125a75200b73dddcbde0ff19208

      SHA256

      1de4671e79d877a91e5108d17b504d3327b0a4087592232bc4c58de71d894dc1

      SHA512

      bec795ee99845fc93e10228e60687a5a413fa25088a7871e30e31140bb6e5d8f9f66d0b97b636e3dc351634af35128c4396deb5eb234ea0249d4dd0eb0cd428b

    • C:\Users\Admin\AppData\Local\Temp\262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5mgr.exe

      Filesize

      106KB

      MD5

      db92102c142a97620d0f02b3321d235b

      SHA1

      84adf0da0cfa131b61a23cf26719b5d0c75702a9

      SHA256

      12dc8f962b54cbf925146db55709c9ad8465e392aede3a5095f74e7ca6ade2a5

      SHA512

      04bbb8ca5e5e63e85da4c4a9de8f46352cb9437005c0cae014da1d61c58916584a284fb7fba21b06f963de440362e150b6f2ef5d69143fd6a187c0712bf28d65

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\O5LOGM39.txt

      Filesize

      535B

      MD5

      1a2aa2c015827d992d431c0e647dba7f

      SHA1

      4c265a0d25492c68f26408b7b223a59b0e81e4da

      SHA256

      c8716cb6a8bbde86b866d04f972777622fd1998942c5ed6cef593fa427a4b06c

      SHA512

      b415d074714ffa31fbca315686a94b6710c2b90f92537af3124f186240f66be2d9cb5c359ed43b97c327afd4f5b02ed6c9d987f80d52e92d3393472fa4094469

    • \Users\Admin\AppData\Local\Temp\262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5mgr.exe

      Filesize

      106KB

      MD5

      db92102c142a97620d0f02b3321d235b

      SHA1

      84adf0da0cfa131b61a23cf26719b5d0c75702a9

      SHA256

      12dc8f962b54cbf925146db55709c9ad8465e392aede3a5095f74e7ca6ade2a5

      SHA512

      04bbb8ca5e5e63e85da4c4a9de8f46352cb9437005c0cae014da1d61c58916584a284fb7fba21b06f963de440362e150b6f2ef5d69143fd6a187c0712bf28d65

    • \Users\Admin\AppData\Local\Temp\262d4435bdd14ffc25fba3554c9eb87b9123d45d7691d01af7313ed4921f6cd5mgr.exe

      Filesize

      106KB

      MD5

      db92102c142a97620d0f02b3321d235b

      SHA1

      84adf0da0cfa131b61a23cf26719b5d0c75702a9

      SHA256

      12dc8f962b54cbf925146db55709c9ad8465e392aede3a5095f74e7ca6ade2a5

      SHA512

      04bbb8ca5e5e63e85da4c4a9de8f46352cb9437005c0cae014da1d61c58916584a284fb7fba21b06f963de440362e150b6f2ef5d69143fd6a187c0712bf28d65

    • memory/836-62-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/836-66-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/1480-54-0x0000000076831000-0x0000000076833000-memory.dmp

      Filesize

      8KB

    • memory/1480-60-0x0000000001000000-0x0000000001055000-memory.dmp

      Filesize

      340KB

    • memory/1480-61-0x0000000000300000-0x000000000035B000-memory.dmp

      Filesize

      364KB

    • memory/1480-68-0x0000000001000000-0x0000000001055000-memory.dmp

      Filesize

      340KB

    • memory/2020-65-0x000007FEFC4E1000-0x000007FEFC4E3000-memory.dmp

      Filesize

      8KB