Analysis

  • max time kernel
    151s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 17:12

General

  • Target

    ffc961c73149fae4c1abc94f066190b77f8c20f5c5c21bbcc0ae0da0d11c9406.dll

  • Size

    163KB

  • MD5

    2ad25d81e8d455471a4f9f803acd02ce

  • SHA1

    0580f084f662cf2b79896eceec2cc57e44e95507

  • SHA256

    ffc961c73149fae4c1abc94f066190b77f8c20f5c5c21bbcc0ae0da0d11c9406

  • SHA512

    56a5d0e48c49918130b173291d75f41c73f85e63615d11ad64bf25ee5fcb97404e8521253a097f7cffa8432693abb8b1394c04d1601f6e69066985cdb7709a77

  • SSDEEP

    3072:nv4tCk6tj9tnCRLMGbwQG52xKUgfyFRsxxulukd0pF:vMAtCRYGbG52gUHRU

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • UAC bypass 3 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ffc961c73149fae4c1abc94f066190b77f8c20f5c5c21bbcc0ae0da0d11c9406.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1624
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ffc961c73149fae4c1abc94f066190b77f8c20f5c5c21bbcc0ae0da0d11c9406.dll,#1
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1676
      • C:\Users\Admin\AppData\Local\Temp\qnOwJ23
        "qnOwJ23"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1916
        • C:\Windows\SysWOW64\svchost.exe
          C:\Windows\system32\svchost.exe
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1740
        • C:\Windows\SysWOW64\svchost.exe
          C:\Windows\system32\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • UAC bypass
          • Checks BIOS information in registry
          • Drops startup file
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1744
        • C:\Users\Admin\AppData\Local\Temp\bjmvnxhgaqpgeaid.exe
          "C:\Users\Admin\AppData\Local\Temp\bjmvnxhgaqpgeaid.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1748

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\bjmvnxhgaqpgeaid.exe

    Filesize

    95KB

    MD5

    5b1a0c379ccc8cab0d06cbeb1338451b

    SHA1

    ae615e94824e0547027768d74d03af8b23fefd4d

    SHA256

    2dccbfc709478a47a8c039619c5aecc11731f3fe8e3a70c26b4e6f668f190d29

    SHA512

    a4433852b9c404df4b8e2d68cabe0df3ff02a2c9ebda7ecc468e73d1651119bd1dc878474f3c508b8d42b8bb78c1c08d1fe5c93175f8e2b15a9765019179c581

  • C:\Users\Admin\AppData\Local\Temp\bjmvnxhgaqpgeaid.exe

    Filesize

    95KB

    MD5

    5b1a0c379ccc8cab0d06cbeb1338451b

    SHA1

    ae615e94824e0547027768d74d03af8b23fefd4d

    SHA256

    2dccbfc709478a47a8c039619c5aecc11731f3fe8e3a70c26b4e6f668f190d29

    SHA512

    a4433852b9c404df4b8e2d68cabe0df3ff02a2c9ebda7ecc468e73d1651119bd1dc878474f3c508b8d42b8bb78c1c08d1fe5c93175f8e2b15a9765019179c581

  • C:\Users\Admin\AppData\Local\Temp\qnOwJ23

    Filesize

    95KB

    MD5

    5b1a0c379ccc8cab0d06cbeb1338451b

    SHA1

    ae615e94824e0547027768d74d03af8b23fefd4d

    SHA256

    2dccbfc709478a47a8c039619c5aecc11731f3fe8e3a70c26b4e6f668f190d29

    SHA512

    a4433852b9c404df4b8e2d68cabe0df3ff02a2c9ebda7ecc468e73d1651119bd1dc878474f3c508b8d42b8bb78c1c08d1fe5c93175f8e2b15a9765019179c581

  • C:\Users\Admin\AppData\Local\Temp\qnOwJ23

    Filesize

    95KB

    MD5

    5b1a0c379ccc8cab0d06cbeb1338451b

    SHA1

    ae615e94824e0547027768d74d03af8b23fefd4d

    SHA256

    2dccbfc709478a47a8c039619c5aecc11731f3fe8e3a70c26b4e6f668f190d29

    SHA512

    a4433852b9c404df4b8e2d68cabe0df3ff02a2c9ebda7ecc468e73d1651119bd1dc878474f3c508b8d42b8bb78c1c08d1fe5c93175f8e2b15a9765019179c581

  • \Users\Admin\AppData\Local\Temp\bjmvnxhgaqpgeaid.exe

    Filesize

    95KB

    MD5

    5b1a0c379ccc8cab0d06cbeb1338451b

    SHA1

    ae615e94824e0547027768d74d03af8b23fefd4d

    SHA256

    2dccbfc709478a47a8c039619c5aecc11731f3fe8e3a70c26b4e6f668f190d29

    SHA512

    a4433852b9c404df4b8e2d68cabe0df3ff02a2c9ebda7ecc468e73d1651119bd1dc878474f3c508b8d42b8bb78c1c08d1fe5c93175f8e2b15a9765019179c581

  • \Users\Admin\AppData\Local\Temp\bjmvnxhgaqpgeaid.exe

    Filesize

    95KB

    MD5

    5b1a0c379ccc8cab0d06cbeb1338451b

    SHA1

    ae615e94824e0547027768d74d03af8b23fefd4d

    SHA256

    2dccbfc709478a47a8c039619c5aecc11731f3fe8e3a70c26b4e6f668f190d29

    SHA512

    a4433852b9c404df4b8e2d68cabe0df3ff02a2c9ebda7ecc468e73d1651119bd1dc878474f3c508b8d42b8bb78c1c08d1fe5c93175f8e2b15a9765019179c581

  • \Users\Admin\AppData\Local\Temp\bjmvnxhgaqpgeaid.exe

    Filesize

    95KB

    MD5

    5b1a0c379ccc8cab0d06cbeb1338451b

    SHA1

    ae615e94824e0547027768d74d03af8b23fefd4d

    SHA256

    2dccbfc709478a47a8c039619c5aecc11731f3fe8e3a70c26b4e6f668f190d29

    SHA512

    a4433852b9c404df4b8e2d68cabe0df3ff02a2c9ebda7ecc468e73d1651119bd1dc878474f3c508b8d42b8bb78c1c08d1fe5c93175f8e2b15a9765019179c581

  • \Users\Admin\AppData\Local\Temp\bjmvnxhgaqpgeaid.exe

    Filesize

    95KB

    MD5

    5b1a0c379ccc8cab0d06cbeb1338451b

    SHA1

    ae615e94824e0547027768d74d03af8b23fefd4d

    SHA256

    2dccbfc709478a47a8c039619c5aecc11731f3fe8e3a70c26b4e6f668f190d29

    SHA512

    a4433852b9c404df4b8e2d68cabe0df3ff02a2c9ebda7ecc468e73d1651119bd1dc878474f3c508b8d42b8bb78c1c08d1fe5c93175f8e2b15a9765019179c581

  • \Users\Admin\AppData\Local\Temp\qnOwJ23

    Filesize

    95KB

    MD5

    5b1a0c379ccc8cab0d06cbeb1338451b

    SHA1

    ae615e94824e0547027768d74d03af8b23fefd4d

    SHA256

    2dccbfc709478a47a8c039619c5aecc11731f3fe8e3a70c26b4e6f668f190d29

    SHA512

    a4433852b9c404df4b8e2d68cabe0df3ff02a2c9ebda7ecc468e73d1651119bd1dc878474f3c508b8d42b8bb78c1c08d1fe5c93175f8e2b15a9765019179c581

  • \Users\Admin\AppData\Local\Temp\qnOwJ23

    Filesize

    95KB

    MD5

    5b1a0c379ccc8cab0d06cbeb1338451b

    SHA1

    ae615e94824e0547027768d74d03af8b23fefd4d

    SHA256

    2dccbfc709478a47a8c039619c5aecc11731f3fe8e3a70c26b4e6f668f190d29

    SHA512

    a4433852b9c404df4b8e2d68cabe0df3ff02a2c9ebda7ecc468e73d1651119bd1dc878474f3c508b8d42b8bb78c1c08d1fe5c93175f8e2b15a9765019179c581

  • memory/1676-54-0x0000000000000000-mapping.dmp

  • memory/1676-55-0x00000000753C1000-0x00000000753C3000-memory.dmp

    Filesize

    8KB

  • memory/1676-80-0x0000000050590000-0x00000000505BB000-memory.dmp

    Filesize

    172KB

  • memory/1676-81-0x00000000000B0000-0x00000000000EB000-memory.dmp

    Filesize

    236KB

  • memory/1676-83-0x00000000000B0000-0x00000000000B6000-memory.dmp

    Filesize

    24KB

  • memory/1740-63-0x0000000020010000-0x000000002001C000-memory.dmp

    Filesize

    48KB

  • memory/1740-65-0x0000000000000000-mapping.dmp

  • memory/1740-66-0x0000000020010000-0x000000002001C000-memory.dmp

    Filesize

    48KB

  • memory/1744-74-0x0000000000000000-mapping.dmp

  • memory/1744-76-0x0000000020010000-0x000000002002C000-memory.dmp

    Filesize

    112KB

  • memory/1744-72-0x0000000020010000-0x000000002002C000-memory.dmp

    Filesize

    112KB

  • memory/1748-88-0x0000000000000000-mapping.dmp

  • memory/1748-92-0x0000000000400000-0x000000000043A0CC-memory.dmp

    Filesize

    232KB

  • memory/1748-93-0x0000000000400000-0x000000000043A0CC-memory.dmp

    Filesize

    232KB

  • memory/1916-82-0x0000000000400000-0x000000000043A0CC-memory.dmp

    Filesize

    232KB

  • memory/1916-58-0x0000000000000000-mapping.dmp