Analysis

  • max time kernel
    159s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 18:43

General

  • Target

    0ff4e71aa98a2ad56e1202a59efcf05c8b5e2c0f98fced5af41cb3410bcf299e.dll

  • Size

    164KB

  • MD5

    558b96b1644a5c38e1daa67107d06307

  • SHA1

    e8a1324ce6b55f1e0376466c275ef75abbfb2683

  • SHA256

    0ff4e71aa98a2ad56e1202a59efcf05c8b5e2c0f98fced5af41cb3410bcf299e

  • SHA512

    bc3bf44aeae09e6c197f61e2c89ae3390308230ac2c74e1ba3e71bb0ac382bdd6f9724bfcc8e6b1cc077e0a01ea3783292a9ba8fd5df141641502dc1c82657b2

  • SSDEEP

    3072:dGJ1uCEt8tOF5pU+F+X+AWVcupt3hhY1vpUZyzAmf0CSK7nEo69RLwv69dRmqe2v:QJnobn+m+1qB8A4kgqe21Vzn

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • UAC bypass 3 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 47 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\0ff4e71aa98a2ad56e1202a59efcf05c8b5e2c0f98fced5af41cb3410bcf299e.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\0ff4e71aa98a2ad56e1202a59efcf05c8b5e2c0f98fced5af41cb3410bcf299e.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:1208
      • C:\Windows\SysWOW64\rundll32mgr.exe
        C:\Windows\SysWOW64\rundll32mgr.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1732
        • C:\Windows\SysWOW64\svchost.exe
          C:\Windows\system32\svchost.exe
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:560
        • C:\Windows\SysWOW64\svchost.exe
          C:\Windows\system32\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • UAC bypass
          • Checks BIOS information in registry
          • Drops startup file
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:760
        • C:\Users\Admin\AppData\Local\Temp\ofjexfnuyxbctbry.exe
          "C:\Users\Admin\AppData\Local\Temp\ofjexfnuyxbctbry.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1084
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1208 -s 228
        3⤵
        • Program crash
        PID:2020

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ofjexfnuyxbctbry.exe

    Filesize

    110KB

    MD5

    f71fbb1f80eb18d999ebf7523c245afd

    SHA1

    b498b16f05362c69a4de7a9820a6ead7c4af3735

    SHA256

    fdc2a8b0fd518ad4573b2b51b189ee22d7bcf903458ee7468f9fece27bce0e7f

    SHA512

    f0e8c10d8784d12b26c2c470a927b35d4f69d7a5662d31b0cc83519da1544a2cae19522ea9534d9437fdc2e1219eac79586ff4858bd223ea908784b12f28c48b

  • C:\Users\Admin\AppData\Local\Temp\ofjexfnuyxbctbry.exe

    Filesize

    110KB

    MD5

    f71fbb1f80eb18d999ebf7523c245afd

    SHA1

    b498b16f05362c69a4de7a9820a6ead7c4af3735

    SHA256

    fdc2a8b0fd518ad4573b2b51b189ee22d7bcf903458ee7468f9fece27bce0e7f

    SHA512

    f0e8c10d8784d12b26c2c470a927b35d4f69d7a5662d31b0cc83519da1544a2cae19522ea9534d9437fdc2e1219eac79586ff4858bd223ea908784b12f28c48b

  • C:\Windows\SysWOW64\rundll32mgr.exe

    Filesize

    110KB

    MD5

    f71fbb1f80eb18d999ebf7523c245afd

    SHA1

    b498b16f05362c69a4de7a9820a6ead7c4af3735

    SHA256

    fdc2a8b0fd518ad4573b2b51b189ee22d7bcf903458ee7468f9fece27bce0e7f

    SHA512

    f0e8c10d8784d12b26c2c470a927b35d4f69d7a5662d31b0cc83519da1544a2cae19522ea9534d9437fdc2e1219eac79586ff4858bd223ea908784b12f28c48b

  • C:\Windows\SysWOW64\rundll32mgr.exe

    Filesize

    110KB

    MD5

    f71fbb1f80eb18d999ebf7523c245afd

    SHA1

    b498b16f05362c69a4de7a9820a6ead7c4af3735

    SHA256

    fdc2a8b0fd518ad4573b2b51b189ee22d7bcf903458ee7468f9fece27bce0e7f

    SHA512

    f0e8c10d8784d12b26c2c470a927b35d4f69d7a5662d31b0cc83519da1544a2cae19522ea9534d9437fdc2e1219eac79586ff4858bd223ea908784b12f28c48b

  • \Users\Admin\AppData\Local\Temp\ofjexfnuyxbctbry.exe

    Filesize

    110KB

    MD5

    f71fbb1f80eb18d999ebf7523c245afd

    SHA1

    b498b16f05362c69a4de7a9820a6ead7c4af3735

    SHA256

    fdc2a8b0fd518ad4573b2b51b189ee22d7bcf903458ee7468f9fece27bce0e7f

    SHA512

    f0e8c10d8784d12b26c2c470a927b35d4f69d7a5662d31b0cc83519da1544a2cae19522ea9534d9437fdc2e1219eac79586ff4858bd223ea908784b12f28c48b

  • \Users\Admin\AppData\Local\Temp\ofjexfnuyxbctbry.exe

    Filesize

    110KB

    MD5

    f71fbb1f80eb18d999ebf7523c245afd

    SHA1

    b498b16f05362c69a4de7a9820a6ead7c4af3735

    SHA256

    fdc2a8b0fd518ad4573b2b51b189ee22d7bcf903458ee7468f9fece27bce0e7f

    SHA512

    f0e8c10d8784d12b26c2c470a927b35d4f69d7a5662d31b0cc83519da1544a2cae19522ea9534d9437fdc2e1219eac79586ff4858bd223ea908784b12f28c48b

  • \Users\Admin\AppData\Local\Temp\ofjexfnuyxbctbry.exe

    Filesize

    110KB

    MD5

    f71fbb1f80eb18d999ebf7523c245afd

    SHA1

    b498b16f05362c69a4de7a9820a6ead7c4af3735

    SHA256

    fdc2a8b0fd518ad4573b2b51b189ee22d7bcf903458ee7468f9fece27bce0e7f

    SHA512

    f0e8c10d8784d12b26c2c470a927b35d4f69d7a5662d31b0cc83519da1544a2cae19522ea9534d9437fdc2e1219eac79586ff4858bd223ea908784b12f28c48b

  • \Users\Admin\AppData\Local\Temp\ofjexfnuyxbctbry.exe

    Filesize

    110KB

    MD5

    f71fbb1f80eb18d999ebf7523c245afd

    SHA1

    b498b16f05362c69a4de7a9820a6ead7c4af3735

    SHA256

    fdc2a8b0fd518ad4573b2b51b189ee22d7bcf903458ee7468f9fece27bce0e7f

    SHA512

    f0e8c10d8784d12b26c2c470a927b35d4f69d7a5662d31b0cc83519da1544a2cae19522ea9534d9437fdc2e1219eac79586ff4858bd223ea908784b12f28c48b

  • \Windows\SysWOW64\rundll32mgr.exe

    Filesize

    110KB

    MD5

    f71fbb1f80eb18d999ebf7523c245afd

    SHA1

    b498b16f05362c69a4de7a9820a6ead7c4af3735

    SHA256

    fdc2a8b0fd518ad4573b2b51b189ee22d7bcf903458ee7468f9fece27bce0e7f

    SHA512

    f0e8c10d8784d12b26c2c470a927b35d4f69d7a5662d31b0cc83519da1544a2cae19522ea9534d9437fdc2e1219eac79586ff4858bd223ea908784b12f28c48b

  • \Windows\SysWOW64\rundll32mgr.exe

    Filesize

    110KB

    MD5

    f71fbb1f80eb18d999ebf7523c245afd

    SHA1

    b498b16f05362c69a4de7a9820a6ead7c4af3735

    SHA256

    fdc2a8b0fd518ad4573b2b51b189ee22d7bcf903458ee7468f9fece27bce0e7f

    SHA512

    f0e8c10d8784d12b26c2c470a927b35d4f69d7a5662d31b0cc83519da1544a2cae19522ea9534d9437fdc2e1219eac79586ff4858bd223ea908784b12f28c48b

  • memory/560-64-0x0000000020010000-0x000000002001C000-memory.dmp

    Filesize

    48KB

  • memory/560-66-0x0000000000000000-mapping.dmp

  • memory/560-67-0x0000000020010000-0x000000002001C000-memory.dmp

    Filesize

    48KB

  • memory/760-75-0x0000000000000000-mapping.dmp

  • memory/760-73-0x0000000020010000-0x0000000020023000-memory.dmp

    Filesize

    76KB

  • memory/760-77-0x0000000020010000-0x0000000020023000-memory.dmp

    Filesize

    76KB

  • memory/1084-94-0x0000000000400000-0x0000000000437B80-memory.dmp

    Filesize

    222KB

  • memory/1084-93-0x0000000000400000-0x0000000000437B80-memory.dmp

    Filesize

    222KB

  • memory/1084-88-0x0000000000000000-mapping.dmp

  • memory/1208-55-0x0000000075991000-0x0000000075993000-memory.dmp

    Filesize

    8KB

  • memory/1208-54-0x0000000000000000-mapping.dmp

  • memory/1208-81-0x0000000010000000-0x000000001002E000-memory.dmp

    Filesize

    184KB

  • memory/1208-82-0x0000000000120000-0x0000000000158000-memory.dmp

    Filesize

    224KB

  • memory/1732-58-0x0000000000000000-mapping.dmp

  • memory/1732-92-0x00000000026A0000-0x00000000026D8000-memory.dmp

    Filesize

    224KB

  • memory/1732-83-0x0000000000400000-0x0000000000437B80-memory.dmp

    Filesize

    222KB

  • memory/2020-61-0x0000000000000000-mapping.dmp