Analysis

  • max time kernel
    138s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    06-11-2022 12:05

General

  • Target

    756ab510af20dfccf570f69c512c47c0d7a1ea7bd80e3000a677d67fc2cda7a9.dll

  • Size

    591KB

  • MD5

    0dd46fd92d967946d1386cdae042122f

  • SHA1

    5d8fb167da54d1acd431dae10f6f82b7bab1c997

  • SHA256

    756ab510af20dfccf570f69c512c47c0d7a1ea7bd80e3000a677d67fc2cda7a9

  • SHA512

    2ed32f3c4929eee36c3061e2ece9b0d2c8bd1a02a12513dd30ce173b7d9899f98f7c62e29d0ab83e322e5cba1db2731d8772d8af9800ab97f24c06326994c8eb

  • SSDEEP

    12288:NJfSgmM68GLj6kGnl17CLmxUuB+rmq+0PtPj4L7domwyuQbl2T5SC:NhSl3j6kJmxVO+0lPY7domx6QC

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 22 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\756ab510af20dfccf570f69c512c47c0d7a1ea7bd80e3000a677d67fc2cda7a9.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:900
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\756ab510af20dfccf570f69c512c47c0d7a1ea7bd80e3000a677d67fc2cda7a9.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2008
      • C:\Windows\SysWOW64\rundll32mgr.exe
        C:\Windows\SysWOW64\rundll32mgr.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2036
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:568
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:568 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1552
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:568 CREDAT:209934 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1348
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:568 CREDAT:603145 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1104
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:568 CREDAT:799753 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1076
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
            PID:968
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            4⤵
              PID:1700
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              4⤵
                PID:1564
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2008 -s 240
              3⤵
              • Program crash
              PID:1304

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\WYMEG11W.txt

          Filesize

          608B

          MD5

          b6256f855ba780ea98800ed5a08fa67b

          SHA1

          6bfc7d790831f33f38eaf0d6ec12019543cb24f9

          SHA256

          17ccf124c9651c263bb157d6f49149987f6b17e47525afab502e794cddbf127d

          SHA512

          23c2bb4391bbffe5bfab4d89176dc4acc46ccecda98f089b3dc129795cb55e1b4619baf911253954b48c3ad7674e1118cdb8c709b3bd75756f1f7aaf1e46603e

        • C:\Windows\SysWOW64\rundll32mgr.exe

          Filesize

          204KB

          MD5

          053349d7ad422a413294766d79fc0b14

          SHA1

          b3bd239f6d8de5d82945d4063161b06ff932ac67

          SHA256

          2aae02cbc873fd41602e7f69427602d3c7062ad62bf0cdb64df3502cc372905c

          SHA512

          3f6ae5958dff78194f1a730db94603bd0d88aa9a33c8ffb62dbe3a1b583b86b638bc017b9cb2a2f368815e00750e12d80be287ac77f4a15afbb7603fee1c154e

        • \Windows\SysWOW64\rundll32mgr.exe

          Filesize

          204KB

          MD5

          053349d7ad422a413294766d79fc0b14

          SHA1

          b3bd239f6d8de5d82945d4063161b06ff932ac67

          SHA256

          2aae02cbc873fd41602e7f69427602d3c7062ad62bf0cdb64df3502cc372905c

          SHA512

          3f6ae5958dff78194f1a730db94603bd0d88aa9a33c8ffb62dbe3a1b583b86b638bc017b9cb2a2f368815e00750e12d80be287ac77f4a15afbb7603fee1c154e

        • \Windows\SysWOW64\rundll32mgr.exe

          Filesize

          204KB

          MD5

          053349d7ad422a413294766d79fc0b14

          SHA1

          b3bd239f6d8de5d82945d4063161b06ff932ac67

          SHA256

          2aae02cbc873fd41602e7f69427602d3c7062ad62bf0cdb64df3502cc372905c

          SHA512

          3f6ae5958dff78194f1a730db94603bd0d88aa9a33c8ffb62dbe3a1b583b86b638bc017b9cb2a2f368815e00750e12d80be287ac77f4a15afbb7603fee1c154e

        • memory/1304-60-0x0000000000000000-mapping.dmp

        • memory/2008-55-0x0000000075AC1000-0x0000000075AC3000-memory.dmp

          Filesize

          8KB

        • memory/2008-54-0x0000000000000000-mapping.dmp

        • memory/2008-61-0x0000000010000000-0x000000001018E000-memory.dmp

          Filesize

          1.6MB

        • memory/2008-62-0x0000000000430000-0x00000000004B9000-memory.dmp

          Filesize

          548KB

        • memory/2036-58-0x0000000000000000-mapping.dmp

        • memory/2036-64-0x0000000000230000-0x0000000000233000-memory.dmp

          Filesize

          12KB

        • memory/2036-66-0x0000000000400000-0x0000000000489000-memory.dmp

          Filesize

          548KB

        • memory/2036-63-0x0000000000400000-0x0000000000489000-memory.dmp

          Filesize

          548KB

        • memory/2036-68-0x0000000000400000-0x0000000000489000-memory.dmp

          Filesize

          548KB