Analysis

  • max time kernel
    108s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2022, 10:54

General

  • Target

    620c7879cb34dd4b36d7210d577e9da2b083a13e80906d1954b12388b6e2d2bd.exe

  • Size

    1.4MB

  • MD5

    10e8a85ba5327f6d208e85739d01fa30

  • SHA1

    d1c944239f30170a894562e80a089aa78911fd35

  • SHA256

    620c7879cb34dd4b36d7210d577e9da2b083a13e80906d1954b12388b6e2d2bd

  • SHA512

    106ebd8bbaf888826b222ed6bc45c4ef0d7a8861a004c084bbc3a05163e251251e9ca45e8e65bf36546fcae1229cf6860d991db72c329c9e10d4ab40a9473de6

  • SSDEEP

    24576:7N0oczSGASBs7Qq0JHVfhiKrnOThTcRtIkaFgT/kts8IzkJjX4n:7upWbSBs7u9riThQtI0T/O5IzkJjw

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 55 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\620c7879cb34dd4b36d7210d577e9da2b083a13e80906d1954b12388b6e2d2bd.exe
    "C:\Users\Admin\AppData\Local\Temp\620c7879cb34dd4b36d7210d577e9da2b083a13e80906d1954b12388b6e2d2bd.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1456
    • C:\Users\Admin\AppData\Local\Temp\620c7879cb34dd4b36d7210d577e9da2b083a13e80906d1954b12388b6e2d2bdmgr.exe
      C:\Users\Admin\AppData\Local\Temp\620c7879cb34dd4b36d7210d577e9da2b083a13e80906d1954b12388b6e2d2bdmgr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1612
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:832
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:832 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1800
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1452
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1452 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1884

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{4A57CB11-6993-11ED-A8EF-5A9C998014C3}.dat

    Filesize

    3KB

    MD5

    7bc3e7409ac2e379be07d292cb7a34db

    SHA1

    13ff566af51c112fe5f37b7c6d1db23a3abfd58c

    SHA256

    2b7f73e11c3c6f604c6a4099465bf8b147fb0cd70dfb20fdfb24d699d3aa29b4

    SHA512

    6624197b655ab4dfaa10a4265721fb37a8db81d6e7a11ade0ba2a70f344b84c4c9776218b581e7e6d81236da60b6702e573ff0c17c488fe88d9a70d2497a2a2f

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{4A57F221-6993-11ED-A8EF-5A9C998014C3}.dat

    Filesize

    5KB

    MD5

    ce81f701754c99f2a0f75341f8dad701

    SHA1

    c721283879309b0b6d422083579967b0d8c9323e

    SHA256

    abf7990c5286a7f527f517c6c0e9960bc49a168b99975c51703750e3f7cce391

    SHA512

    5152d0b1e130bd0b4bba9a74fcc347cbdab3654617f5586fc1bd6e6b940194df79547d642714dd60067d9993f04165f6f30adaeb7c2c715e0a12d9556d8d110b

  • C:\Users\Admin\AppData\Local\Temp\620c7879cb34dd4b36d7210d577e9da2b083a13e80906d1954b12388b6e2d2bdmgr.exe

    Filesize

    132KB

    MD5

    03458f75016342531765a7def629c6fe

    SHA1

    7e14e6534123ce7e51aafa2ccda4688a4524eeaf

    SHA256

    860fdd78a1ca6dd68db4d64b918ef1fea1734a0650d4aad8c159eaf1e41ba98f

    SHA512

    2db0af32ab82875e50d630798ee81b8a6fef9d1fccd6953fb891e6fc07fc048b30e65fd934ad8f6bd1531d7dcb73129043a219e28f82f55497a84b8b5e9ec198

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\VK3VTLI6.txt

    Filesize

    601B

    MD5

    6e8a2ef0ac9500c44e28576e611cedd6

    SHA1

    3929c661335e253b203a7a90fc6996359ccdabd0

    SHA256

    b36c2d51e3823749fe07a27f5b734275815d875f3a8f1808fa60b552f264cd53

    SHA512

    3afb1907d7506039938573296654172430e212af7976ceb1d933636c9aaf745b65ac761ec6c915abd3b9dee0cfb84facf58058f357c3a04552e17968ab738b91

  • \Users\Admin\AppData\Local\Temp\620c7879cb34dd4b36d7210d577e9da2b083a13e80906d1954b12388b6e2d2bdmgr.exe

    Filesize

    132KB

    MD5

    03458f75016342531765a7def629c6fe

    SHA1

    7e14e6534123ce7e51aafa2ccda4688a4524eeaf

    SHA256

    860fdd78a1ca6dd68db4d64b918ef1fea1734a0650d4aad8c159eaf1e41ba98f

    SHA512

    2db0af32ab82875e50d630798ee81b8a6fef9d1fccd6953fb891e6fc07fc048b30e65fd934ad8f6bd1531d7dcb73129043a219e28f82f55497a84b8b5e9ec198

  • \Users\Admin\AppData\Local\Temp\620c7879cb34dd4b36d7210d577e9da2b083a13e80906d1954b12388b6e2d2bdmgr.exe

    Filesize

    132KB

    MD5

    03458f75016342531765a7def629c6fe

    SHA1

    7e14e6534123ce7e51aafa2ccda4688a4524eeaf

    SHA256

    860fdd78a1ca6dd68db4d64b918ef1fea1734a0650d4aad8c159eaf1e41ba98f

    SHA512

    2db0af32ab82875e50d630798ee81b8a6fef9d1fccd6953fb891e6fc07fc048b30e65fd934ad8f6bd1531d7dcb73129043a219e28f82f55497a84b8b5e9ec198

  • memory/1456-54-0x0000000075C81000-0x0000000075C83000-memory.dmp

    Filesize

    8KB

  • memory/1456-61-0x0000000000400000-0x000000000087A000-memory.dmp

    Filesize

    4.5MB

  • memory/1456-62-0x00000000002E0000-0x000000000033D000-memory.dmp

    Filesize

    372KB

  • memory/1456-63-0x00000000002E0000-0x000000000033D000-memory.dmp

    Filesize

    372KB

  • memory/1456-66-0x0000000000400000-0x000000000087A000-memory.dmp

    Filesize

    4.5MB

  • memory/1612-64-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/1612-65-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB