Analysis

  • max time kernel
    119s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 07:40

General

  • Target

    d25be99cd52f5d3b4388bbcedeaaeb36a5ea656e771de4474e55ff2fa461c2e6.dll

  • Size

    348KB

  • MD5

    e94f8a31dccaec0086f370c22ae4c6e0

  • SHA1

    2802a01b8a89e0299c5d3e4bbc70f752094c87a8

  • SHA256

    d25be99cd52f5d3b4388bbcedeaaeb36a5ea656e771de4474e55ff2fa461c2e6

  • SHA512

    af4f8ed59a38dff42d14902718d35fe9e6a64ffdf6a027e19d991776924c1bd8866715442eed1715a4e4bd3757c1ed2fceb4315223d2f7c5a62be38b985e9fb2

  • SSDEEP

    6144:IQb6g1fEi2FSGXbOYvz2+uOpGTIttHUUYTB/tZeXSGxUk1mAjE/FYhfA3u7i3108:IttBEGXKSqEpGTIPdYT9tZeXFxXSydAD

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 53 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\d25be99cd52f5d3b4388bbcedeaaeb36a5ea656e771de4474e55ff2fa461c2e6.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\d25be99cd52f5d3b4388bbcedeaaeb36a5ea656e771de4474e55ff2fa461c2e6.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:1704
      • C:\Windows\SysWOW64\rundll32mgr.exe
        C:\Windows\SysWOW64\rundll32mgr.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1172
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1780
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1780 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1636
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1116
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1116 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2040
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1704 -s 228
        3⤵
        • Program crash
        PID:1856

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{8E5FB461-70AC-11ED-8B0A-7A3897842414}.dat

    Filesize

    3KB

    MD5

    c769898b9c783e80145afb714c339c8c

    SHA1

    8dbab055242f18695081e73c53a0c29ed9b4b3da

    SHA256

    4ef62d6306f2dc7984c73351feef00b13e74111a3a525b2a5095f1011db84910

    SHA512

    785838f54239b35bb42bee0fa009054427b5ddea00df43c443546168ab734a82797938bf62c350875b402f0610ca9983b6e549e16818942cdf96faeed1eb489e

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{8E5FDB71-70AC-11ED-8B0A-7A3897842414}.dat

    Filesize

    4KB

    MD5

    74cb4f81cb19cec4a231d399509de614

    SHA1

    15f42bf52536b64a4b9d2cd9912a559187c1f2a5

    SHA256

    7724b58975bc3ce3397bfb752ec0c209bff0de47eb3c8d3c17fdd304105c6b10

    SHA512

    c2ab87ce2523be9a4d4fa0228887765079ade2c69b722e18d66723c0d28406472d1a487341603ccec758f3483f77b6d3a0edf523ea6ef8c3d5be5427f6b02981

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\UE2OZQMV.txt

    Filesize

    606B

    MD5

    3a9333fc508f9574dff21c3fca0570f5

    SHA1

    e340b818937ad1c5471aa32a8c49ddbd5c6a1b56

    SHA256

    9f1751b37a6254dd6500b47244d81e6569f7979af78ebbcc7fa937fa97f16913

    SHA512

    b11670ecf6cd7f61597b4128450f5c1f2ab74f8bfdd28d4e652d9ee8209eca1be15e9cff90bc7c1215d1974709559262c5b621b0c8e8dc3d9e8014ef98a0cd8e

  • C:\Windows\SysWOW64\rundll32mgr.exe

    Filesize

    99KB

    MD5

    f3873258a4258a6761dc54d47463182f

    SHA1

    fbbf8bca739ca4e9745e5224662b33b437a52461

    SHA256

    63b02a3e8e7e049d1f29cd4cd79fe5c8905754da6c023df72aa5cca351d0d5c5

    SHA512

    eec16bb41fd05d9acd5d2b17eb5218057c3cd97cd706e0782a64eb2c32f8a57f1206fe0268be7f37a9f1c3f7b8eb09767cf2724951eaee4be03c4d509d4b3dd4

  • \Windows\SysWOW64\rundll32mgr.exe

    Filesize

    99KB

    MD5

    f3873258a4258a6761dc54d47463182f

    SHA1

    fbbf8bca739ca4e9745e5224662b33b437a52461

    SHA256

    63b02a3e8e7e049d1f29cd4cd79fe5c8905754da6c023df72aa5cca351d0d5c5

    SHA512

    eec16bb41fd05d9acd5d2b17eb5218057c3cd97cd706e0782a64eb2c32f8a57f1206fe0268be7f37a9f1c3f7b8eb09767cf2724951eaee4be03c4d509d4b3dd4

  • \Windows\SysWOW64\rundll32mgr.exe

    Filesize

    99KB

    MD5

    f3873258a4258a6761dc54d47463182f

    SHA1

    fbbf8bca739ca4e9745e5224662b33b437a52461

    SHA256

    63b02a3e8e7e049d1f29cd4cd79fe5c8905754da6c023df72aa5cca351d0d5c5

    SHA512

    eec16bb41fd05d9acd5d2b17eb5218057c3cd97cd706e0782a64eb2c32f8a57f1206fe0268be7f37a9f1c3f7b8eb09767cf2724951eaee4be03c4d509d4b3dd4

  • memory/1172-63-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/1172-64-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/1704-61-0x0000000040000000-0x0000000040057000-memory.dmp

    Filesize

    348KB

  • memory/1704-62-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/1704-55-0x00000000762B1000-0x00000000762B3000-memory.dmp

    Filesize

    8KB