Analysis

  • max time kernel
    136s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 19:01

General

  • Target

    c8e89bc12e639b4d2fa69591b60224515bcff7996cb758f6025a6f8f03902c58.exe

  • Size

    317KB

  • MD5

    43005d910989d6d164915a1137baf860

  • SHA1

    6b1f3c4a8b95c632cb00c56845ec69cf0aa00b7c

  • SHA256

    c8e89bc12e639b4d2fa69591b60224515bcff7996cb758f6025a6f8f03902c58

  • SHA512

    08e1d54d9a5b719145bcd07db52691f0fd2316d88f123c1539aa699ea127a517805f278d43e9efd1ead3b9e6e2d692edccf792ff71223c0588ff82a15659499a

  • SSDEEP

    6144:rP80iFlOwIjKou2QpK44i8eE68Z2cXvp/IHeiorgVZ:rktQwIuouDK4llE6lcXhA+i3

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 55 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 20 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c8e89bc12e639b4d2fa69591b60224515bcff7996cb758f6025a6f8f03902c58.exe
    "C:\Users\Admin\AppData\Local\Temp\c8e89bc12e639b4d2fa69591b60224515bcff7996cb758f6025a6f8f03902c58.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1752
    • C:\Users\Admin\AppData\Local\Temp\c8e89bc12e639b4d2fa69591b60224515bcff7996cb758f6025a6f8f03902c58mgr.exe
      C:\Users\Admin\AppData\Local\Temp\c8e89bc12e639b4d2fa69591b60224515bcff7996cb758f6025a6f8f03902c58mgr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1208
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:520
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:520 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1040
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:520 CREDAT:209934 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1372
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1788
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1788 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1280
    • C:\Users\Admin\AppData\Local\Temp\c8e89bc12e639b4d2fa69591b60224515bcff7996cb758f6025a6f8f03902c58.exe
      "C:\Users\Admin\AppData\Local\Temp\c8e89bc12e639b4d2fa69591b60224515bcff7996cb758f6025a6f8f03902c58.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:1096
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\system32\svchost.exe"
        3⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1672
        • C:\Windows\SysWOW64\mspaint.exe
          "C:\Windows\system32\mspaint.exe"
          4⤵
          • Adds Run key to start application
          • Enumerates connected drives
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:868
      • C:\Users\Admin\AppData\Local\Temp\c8e89bc12e639b4d2fa69591b60224515bcff7996cb758f6025a6f8f03902c58.exe
        "C:\Users\Admin\AppData\Local\Temp\c8e89bc12e639b4d2fa69591b60224515bcff7996cb758f6025a6f8f03902c58.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2028
        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
          "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1984
          • C:\Program Files\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
            5⤵
              PID:872

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{2B477221-6B7D-11ED-B68C-6A6CB2F85B9F}.dat
      Filesize

      3KB

      MD5

      2dc721b64498c4f4370b6f0c90315120

      SHA1

      9988ce1b43568f16d9bd0e9fe27a4adaa1d5c86c

      SHA256

      78d9082547fe0fbb734dd68a48579c93f2812d48a3ba40a0be7600df9e1a0267

      SHA512

      593792fc259e7667c3ff128d5b8c188f0ff838158827bab78e66fc19629c3db83ff6615fe2acaf7cc6ca7f6b783b5ddb5dd409e47c2f3d436743e6354b7ec928

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{2B479931-6B7D-11ED-B68C-6A6CB2F85B9F}.dat
      Filesize

      5KB

      MD5

      a03bd0acfcfe8edefa0d6e6fd3e0073c

      SHA1

      911e386d2854adc1fe5a852a40aa1eb9f790ec53

      SHA256

      fa66eccd8590649e4363498362ba984dcf4f615ff6eb2e1f18d86327f40a78b1

      SHA512

      909ba95b28f567c69723ef0613b12ad6b64b1a1bc82bb2b65ebf43b5b644c3b045154b57303a2c4c0b72a823f2f045be53d7184a8997451269ab0e3456b0c857

    • C:\Users\Admin\AppData\Local\Temp\c8e89bc12e639b4d2fa69591b60224515bcff7996cb758f6025a6f8f03902c58mgr.exe
      Filesize

      143KB

      MD5

      926a51a69d4cd3b64dc0b6769dc2687c

      SHA1

      ecd8ee4160d0b78303900a31f8f365b216ac9867

      SHA256

      9361755715f0c99961824bc1201071e9a3386b27b2ed6094db911b3c48351423

      SHA512

      5bf67c92c2e5b379961b8ccde6503fc603632db34e2762d09a5997539a99d16499b6a6a9f806f9dc1d613374c1089df957b5599c442740bc32c745a7a76426e1

    • C:\Users\Admin\AppData\Local\Temp\c8e89bc12e639b4d2fa69591b60224515bcff7996cb758f6025a6f8f03902c58mgr.exe
      Filesize

      143KB

      MD5

      926a51a69d4cd3b64dc0b6769dc2687c

      SHA1

      ecd8ee4160d0b78303900a31f8f365b216ac9867

      SHA256

      9361755715f0c99961824bc1201071e9a3386b27b2ed6094db911b3c48351423

      SHA512

      5bf67c92c2e5b379961b8ccde6503fc603632db34e2762d09a5997539a99d16499b6a6a9f806f9dc1d613374c1089df957b5599c442740bc32c745a7a76426e1

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\8NS9NB23.txt
      Filesize

      603B

      MD5

      9af59da869a82944cd1e5156c6f82ae2

      SHA1

      e294b1b69c5c4725804e3f4e96025d4f3ba27caa

      SHA256

      f8278512fad58873666ffa638898dffe306c4308c6c24fa59046136fdb861944

      SHA512

      29fba9050880c1ea17be85517f6967f2da543e4eda3be020f9fa41f828e9b6cd30a7fa99452b526c484fd6cf19339bbd125c31a706bda777cf68a66a463477f4

    • \Users\Admin\AppData\Local\Temp\c8e89bc12e639b4d2fa69591b60224515bcff7996cb758f6025a6f8f03902c58mgr.exe
      Filesize

      143KB

      MD5

      926a51a69d4cd3b64dc0b6769dc2687c

      SHA1

      ecd8ee4160d0b78303900a31f8f365b216ac9867

      SHA256

      9361755715f0c99961824bc1201071e9a3386b27b2ed6094db911b3c48351423

      SHA512

      5bf67c92c2e5b379961b8ccde6503fc603632db34e2762d09a5997539a99d16499b6a6a9f806f9dc1d613374c1089df957b5599c442740bc32c745a7a76426e1

    • \Users\Admin\AppData\Local\Temp\c8e89bc12e639b4d2fa69591b60224515bcff7996cb758f6025a6f8f03902c58mgr.exe
      Filesize

      143KB

      MD5

      926a51a69d4cd3b64dc0b6769dc2687c

      SHA1

      ecd8ee4160d0b78303900a31f8f365b216ac9867

      SHA256

      9361755715f0c99961824bc1201071e9a3386b27b2ed6094db911b3c48351423

      SHA512

      5bf67c92c2e5b379961b8ccde6503fc603632db34e2762d09a5997539a99d16499b6a6a9f806f9dc1d613374c1089df957b5599c442740bc32c745a7a76426e1

    • memory/868-324-0x00000000042B8000-0x00000000042BA000-memory.dmp
      Filesize

      8KB

    • memory/868-313-0x00000000042B8000-0x00000000042BA000-memory.dmp
      Filesize

      8KB

    • memory/868-140-0x0000000004280000-0x00000000042CE000-memory.dmp
      Filesize

      312KB

    • memory/868-131-0x0000000004280000-0x00000000042CE000-memory.dmp
      Filesize

      312KB

    • memory/868-125-0x0000000004280000-0x00000000042CE000-memory.dmp
      Filesize

      312KB

    • memory/868-119-0x0000000004280000-0x00000000042CE000-memory.dmp
      Filesize

      312KB

    • memory/868-114-0x0000000004280000-0x00000000042CE000-memory.dmp
      Filesize

      312KB

    • memory/868-98-0x0000000000791000-0x0000000000793000-memory.dmp
      Filesize

      8KB

    • memory/868-323-0x0000000004280000-0x00000000042CE000-memory.dmp
      Filesize

      312KB

    • memory/868-96-0x0000000000000000-mapping.dmp
    • memory/1096-71-0x0000000000402940-mapping.dmp
    • memory/1096-70-0x0000000000400000-0x0000000000421000-memory.dmp
      Filesize

      132KB

    • memory/1096-66-0x0000000000400000-0x0000000000421000-memory.dmp
      Filesize

      132KB

    • memory/1096-69-0x0000000000400000-0x0000000000421000-memory.dmp
      Filesize

      132KB

    • memory/1096-75-0x0000000076261000-0x0000000076263000-memory.dmp
      Filesize

      8KB

    • memory/1096-67-0x0000000000400000-0x0000000000421000-memory.dmp
      Filesize

      132KB

    • memory/1096-63-0x0000000000400000-0x0000000000421000-memory.dmp
      Filesize

      132KB

    • memory/1096-64-0x0000000000400000-0x0000000000421000-memory.dmp
      Filesize

      132KB

    • memory/1096-100-0x0000000002420000-0x0000000002476000-memory.dmp
      Filesize

      344KB

    • memory/1096-99-0x0000000000400000-0x0000000000421000-memory.dmp
      Filesize

      132KB

    • memory/1208-56-0x0000000000000000-mapping.dmp
    • memory/1208-60-0x0000000000400000-0x0000000000467000-memory.dmp
      Filesize

      412KB

    • memory/1208-90-0x0000000000400000-0x0000000000467000-memory.dmp
      Filesize

      412KB

    • memory/1672-109-0x0000000000230000-0x000000000027E000-memory.dmp
      Filesize

      312KB

    • memory/1672-132-0x0000000000230000-0x000000000027E000-memory.dmp
      Filesize

      312KB

    • memory/1672-139-0x0000000000230000-0x000000000027E000-memory.dmp
      Filesize

      312KB

    • memory/1672-102-0x0000000000080000-0x00000000000A1000-memory.dmp
      Filesize

      132KB

    • memory/1672-322-0x0000000000230000-0x000000000027E000-memory.dmp
      Filesize

      312KB

    • memory/1672-113-0x0000000000230000-0x000000000027E000-memory.dmp
      Filesize

      312KB

    • memory/1672-120-0x0000000000230000-0x000000000027E000-memory.dmp
      Filesize

      312KB

    • memory/1672-126-0x0000000000230000-0x000000000027E000-memory.dmp
      Filesize

      312KB

    • memory/1672-78-0x0000000000000000-mapping.dmp
    • memory/1752-72-0x0000000000320000-0x0000000000376000-memory.dmp
      Filesize

      344KB

    • memory/1752-73-0x0000000000400000-0x0000000000456000-memory.dmp
      Filesize

      344KB

    • memory/1752-59-0x0000000000220000-0x0000000000287000-memory.dmp
      Filesize

      412KB

    • memory/1752-58-0x0000000000400000-0x0000000000456000-memory.dmp
      Filesize

      344KB

    • memory/2028-115-0x0000000000320000-0x000000000036E000-memory.dmp
      Filesize

      312KB

    • memory/2028-121-0x0000000000320000-0x000000000036E000-memory.dmp
      Filesize

      312KB

    • memory/2028-127-0x0000000000320000-0x000000000036E000-memory.dmp
      Filesize

      312KB

    • memory/2028-108-0x0000000000320000-0x000000000036E000-memory.dmp
      Filesize

      312KB

    • memory/2028-101-0x0000000000400000-0x000000000044E000-memory.dmp
      Filesize

      312KB

    • memory/2028-133-0x0000000000320000-0x000000000036E000-memory.dmp
      Filesize

      312KB

    • memory/2028-95-0x0000000000400000-0x000000000044E000-memory.dmp
      Filesize

      312KB

    • memory/2028-136-0x0000000000320000-0x00000000003E4000-memory.dmp
      Filesize

      784KB

    • memory/2028-141-0x0000000000320000-0x000000000036E000-memory.dmp
      Filesize

      312KB

    • memory/2028-91-0x0000000000410910-mapping.dmp
    • memory/2028-89-0x0000000000400000-0x000000000044E000-memory.dmp
      Filesize

      312KB

    • memory/2028-291-0x0000000000400000-0x000000000044E000-memory.dmp
      Filesize

      312KB

    • memory/2028-294-0x0000000000320000-0x000000000036E000-memory.dmp
      Filesize

      312KB

    • memory/2028-87-0x0000000000400000-0x000000000044E000-memory.dmp
      Filesize

      312KB

    • memory/2028-85-0x0000000000400000-0x000000000044E000-memory.dmp
      Filesize

      312KB

    • memory/2028-83-0x0000000000400000-0x000000000044E000-memory.dmp
      Filesize

      312KB

    • memory/2028-80-0x0000000000400000-0x000000000044E000-memory.dmp
      Filesize

      312KB

    • memory/2028-79-0x0000000000400000-0x000000000044E000-memory.dmp
      Filesize

      312KB