Analysis

  • max time kernel
    145s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06/11/2022, 21:19

General

  • Target

    4165eb5fc7966d7ccd54b5f5906c24e115e1e1794b958a1349150d7a3db51f2c.exe

  • Size

    316KB

  • MD5

    0ceea61bc6edaf3be3181f4bf371fe60

  • SHA1

    6008989ba2490a423b261e6980053810dcc116cc

  • SHA256

    4165eb5fc7966d7ccd54b5f5906c24e115e1e1794b958a1349150d7a3db51f2c

  • SHA512

    8d940a209c28479d321cc2e064c08a8b513d9e80693bf3e5ef4650b82ff09f0b632958dcfb4da8e76884b2cfcc0596e9bae6d09b0c3594671dcc0e4ec48f7a96

  • SSDEEP

    3072:ZnBSM9pb9TzlqZZtvtPbacIxxW5BczeLstUauCSXlqoOJzYkXIXWNBUpGeVMVFi3:OMjb9TOZtNWcIxEq7urkNfu8Fq8xuje0

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 53 IoCs
  • Modifies registry class 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4165eb5fc7966d7ccd54b5f5906c24e115e1e1794b958a1349150d7a3db51f2c.exe
    "C:\Users\Admin\AppData\Local\Temp\4165eb5fc7966d7ccd54b5f5906c24e115e1e1794b958a1349150d7a3db51f2c.exe"
    1⤵
    • Loads dropped DLL
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:736
    • C:\Users\Admin\AppData\Local\Temp\4165eb5fc7966d7ccd54b5f5906c24e115e1e1794b958a1349150d7a3db51f2cmgr.exe
      C:\Users\Admin\AppData\Local\Temp\4165eb5fc7966d7ccd54b5f5906c24e115e1e1794b958a1349150d7a3db51f2cmgr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:284
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1952
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1760
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:940
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:940 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1764

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{12F16F31-5E5F-11ED-B7B1-7ADD0904B6AC}.dat

    Filesize

    5KB

    MD5

    f40d9911a68314e22471f8a16fb6055e

    SHA1

    e408e3610032a367f17d62bbd5220839bd40b650

    SHA256

    574eeb277898d5e50ec463108f6d0fb3dc109b962bdeb4b69b3850a3b6b322df

    SHA512

    1832101e63354fe4de953b88f0f6561d990fc6966471aace7691e282b0514c326f058fb1905a987456d8b9ec3043002ccd8eacffceec4aa5110e8321f4981ddc

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{12F19641-5E5F-11ED-B7B1-7ADD0904B6AC}.dat

    Filesize

    4KB

    MD5

    f72c2ee7d87e8104c5152a2a721ae2d2

    SHA1

    10f5cd346735983cc3b5cbd6e1f34c10fd8ee3b7

    SHA256

    38aeff218607220995a0bfe0d7d23c2ef29851bd1a5ff74c34da28d78daef7d5

    SHA512

    4903b33b7ee2db688726a6c6ad12e71b184f6458108dc44ad7b6f0f18f7f873e701cde8539d40fe6c79ea84c62ddb9f42d185305d82433831e6965e7892d8392

  • C:\Users\Admin\AppData\Local\Temp\4165eb5fc7966d7ccd54b5f5906c24e115e1e1794b958a1349150d7a3db51f2cmgr.exe

    Filesize

    105KB

    MD5

    dfb5daabb95dcfad1a5faf9ab1437076

    SHA1

    4a199569a9b52911bee7fb19ab80570cc5ff9ed1

    SHA256

    54282ec29d4993ed6e9972122cfbb70bba4898a21d527bd9e72a166d7ec2fdc0

    SHA512

    5d31c34403ab5f8db4a6d84f2b5579d4ea18673914b626d78e458a648ac20ddd8e342818e807331036d7bb064f596a02b9737acac42fbead29260343a30717e8

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\PX3PUE6H.txt

    Filesize

    602B

    MD5

    4df6924c3e165ca6e563ace4892c8c56

    SHA1

    193083ffe35d2698549906bc3516780b4c376e10

    SHA256

    26b19b2b63ca045cee51970c51e00922dc28c695107952b2866608afe033ff75

    SHA512

    705f54a3ab15bffd2e0c424a9afe17f62dff744762b9b1f039bdcae1fb049f8cfe8e9286621754c457ad2d53ac6ead80e178fcb5a6d258ba2332018a205ebe41

  • \Users\Admin\AppData\Local\Temp\4165eb5fc7966d7ccd54b5f5906c24e115e1e1794b958a1349150d7a3db51f2cmgr.exe

    Filesize

    105KB

    MD5

    dfb5daabb95dcfad1a5faf9ab1437076

    SHA1

    4a199569a9b52911bee7fb19ab80570cc5ff9ed1

    SHA256

    54282ec29d4993ed6e9972122cfbb70bba4898a21d527bd9e72a166d7ec2fdc0

    SHA512

    5d31c34403ab5f8db4a6d84f2b5579d4ea18673914b626d78e458a648ac20ddd8e342818e807331036d7bb064f596a02b9737acac42fbead29260343a30717e8

  • \Users\Admin\AppData\Local\Temp\4165eb5fc7966d7ccd54b5f5906c24e115e1e1794b958a1349150d7a3db51f2cmgr.exe

    Filesize

    105KB

    MD5

    dfb5daabb95dcfad1a5faf9ab1437076

    SHA1

    4a199569a9b52911bee7fb19ab80570cc5ff9ed1

    SHA256

    54282ec29d4993ed6e9972122cfbb70bba4898a21d527bd9e72a166d7ec2fdc0

    SHA512

    5d31c34403ab5f8db4a6d84f2b5579d4ea18673914b626d78e458a648ac20ddd8e342818e807331036d7bb064f596a02b9737acac42fbead29260343a30717e8

  • memory/284-63-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/284-64-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/736-62-0x0000000000700000-0x000000000075B000-memory.dmp

    Filesize

    364KB

  • memory/736-61-0x0000000000A90000-0x0000000000AE8000-memory.dmp

    Filesize

    352KB

  • memory/736-54-0x0000000076201000-0x0000000076203000-memory.dmp

    Filesize

    8KB

  • memory/736-66-0x0000000000A90000-0x0000000000AE8000-memory.dmp

    Filesize

    352KB