Analysis

  • max time kernel
    105s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06/11/2022, 21:07

General

  • Target

    68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1.exe

  • Size

    389KB

  • MD5

    060e63630afce5acbb77168b488a8f40

  • SHA1

    26da8a7728985a42a72dbf50b38d6533394ae51f

  • SHA256

    68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1

  • SHA512

    9f8d13ff55cc57d5da9130b849ae3b19055a6864ab3a385b61dab7044c044fb52c52b2d34f4d839ac3d8cda3a1df7914f828566cc692387ab4d24fb17ee4a981

  • SSDEEP

    6144:H5BJvadeLnJiYZ+up5BmmbqaRhmNN5HcdOHjPvfALvbCHI:H/AmiwZ/JqVcW7ALvbEI

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 53 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1.exe
    "C:\Users\Admin\AppData\Local\Temp\68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1100
    • C:\Users\Admin\AppData\Local\Temp\68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1mgr.exe
      C:\Users\Admin\AppData\Local\Temp\68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1mgr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1896
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1372
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1372 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1552
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1708
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1708 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1804
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1232

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{744F7541-5E5C-11ED-8B55-6651945CA213}.dat

      Filesize

      4KB

      MD5

      8f3829c2a49b31d3e133af20db44d829

      SHA1

      c1f24d749b6f465e620675140719a33e791b1186

      SHA256

      d3a35a775d80807efb9a466f23209b1ffbad282a38ddf2effca48d8cde30b34a

      SHA512

      578671b68a5048ba77013bfe5578184ca2babb5856b7581cd86b98fdb5acd1061b8179696ca03c74bb25418db420bf75aa278f4ad4cc9297bf0e580061aee57a

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{74514A01-5E5C-11ED-8B55-6651945CA213}.dat

      Filesize

      5KB

      MD5

      d5fd03245ed50fa67e18bb2daca01add

      SHA1

      da407a701274f6fc0a8ef8bdd6c84b80e9c19c86

      SHA256

      6f3254d5de11e306efc74a1bdcfc389b5343833baa3beb7678e012e4f93253a1

      SHA512

      44bfca491a5a8088a2b22d5c114f9a0462407d9fa88941d89e9e665edb88cad322cf7a8d596de0269ba072ec9fe57c3b4fcf4c5034a4166de2ed9cb6f83c4b3b

    • C:\Users\Admin\AppData\Local\Temp\68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1mgr.exe

      Filesize

      173KB

      MD5

      368c6653018fffc8902b3404f1330c5f

      SHA1

      11222508abc7a16e6d5004b92645c22173bd805c

      SHA256

      322b8fe73a8f4d60627aac70bad1e724e2a8e4b605ac3b1cec96cd9029591825

      SHA512

      108afbb6af60e2fd445cc9494b901b604ec353b39c1d6e36a47f27a877d0696241b128134c4471c22f94bde2adffab0efb871b80708369412d9179f3b672a756

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\W2HJRW6U.txt

      Filesize

      608B

      MD5

      73d04ab9d8f2742c74575e42add4f2d0

      SHA1

      d42ed458f703dbe8b58e1f6da2ea7528d1799c81

      SHA256

      bba4a5e50c1421fb356f2d8513bddffdc0119031f4a03d814b2f788327c0b4ed

      SHA512

      e7e4115e6ae602c72b853c4ba46f7d1a5acf9c4f82977a14286212411f28dd71d2347d29bbf8547f83fe433e3e0817c5c06090d17284dd35af8bed357b6e7102

    • \Users\Admin\AppData\Local\Temp\68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1mgr.exe

      Filesize

      173KB

      MD5

      368c6653018fffc8902b3404f1330c5f

      SHA1

      11222508abc7a16e6d5004b92645c22173bd805c

      SHA256

      322b8fe73a8f4d60627aac70bad1e724e2a8e4b605ac3b1cec96cd9029591825

      SHA512

      108afbb6af60e2fd445cc9494b901b604ec353b39c1d6e36a47f27a877d0696241b128134c4471c22f94bde2adffab0efb871b80708369412d9179f3b672a756

    • \Users\Admin\AppData\Local\Temp\68b2dab467a69223c9f6d23a3bd9aadf567add039f7f485b7fd6149eec0afbc1mgr.exe

      Filesize

      173KB

      MD5

      368c6653018fffc8902b3404f1330c5f

      SHA1

      11222508abc7a16e6d5004b92645c22173bd805c

      SHA256

      322b8fe73a8f4d60627aac70bad1e724e2a8e4b605ac3b1cec96cd9029591825

      SHA512

      108afbb6af60e2fd445cc9494b901b604ec353b39c1d6e36a47f27a877d0696241b128134c4471c22f94bde2adffab0efb871b80708369412d9179f3b672a756

    • memory/1100-63-0x0000000001000000-0x0000000001065000-memory.dmp

      Filesize

      404KB

    • memory/1100-54-0x00000000763F1000-0x00000000763F3000-memory.dmp

      Filesize

      8KB

    • memory/1100-64-0x0000000000400000-0x000000000046C000-memory.dmp

      Filesize

      432KB

    • memory/1100-68-0x0000000001000000-0x0000000001065000-memory.dmp

      Filesize

      404KB

    • memory/1232-62-0x000007FEFC1F1000-0x000007FEFC1F3000-memory.dmp

      Filesize

      8KB

    • memory/1896-65-0x0000000000400000-0x000000000046C000-memory.dmp

      Filesize

      432KB

    • memory/1896-66-0x0000000000400000-0x000000000046C000-memory.dmp

      Filesize

      432KB