Analysis

  • max time kernel
    130s
  • max time network
    196s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 07:49

General

  • Target

    8b06a262bc18bcb8d10d3a697a698d63a180bb093d019bfac10e455bfa38b41f.exe

  • Size

    202KB

  • MD5

    ba35875c6ee759ad4b7bb8a25537c6b5

  • SHA1

    815c13130f8b3c2c9d451e7de30eb621ac5c113b

  • SHA256

    8b06a262bc18bcb8d10d3a697a698d63a180bb093d019bfac10e455bfa38b41f

  • SHA512

    4951e7bf25a6f3b75d08c47c75030aa12281af7d7080d82b1c093b41482e6857388793410f5239584677b7f27a8e467649e984b95701557d729c567b99a964f1

  • SSDEEP

    6144:OVycnBzwu/dJ1bX/a3D9+yyXM1K3eM50gSzLqy:OlBRjBWxyXP0LXH

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b06a262bc18bcb8d10d3a697a698d63a180bb093d019bfac10e455bfa38b41f.exe
    "C:\Users\Admin\AppData\Local\Temp\8b06a262bc18bcb8d10d3a697a698d63a180bb093d019bfac10e455bfa38b41f.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Users\Admin\AppData\Local\Temp\8b06a262bc18bcb8d10d3a697a698d63a180bb093d019bfac10e455bfa38b41fmgr.exe
      C:\Users\Admin\AppData\Local\Temp\8b06a262bc18bcb8d10d3a697a698d63a180bb093d019bfac10e455bfa38b41fmgr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1648
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1900
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1900 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:488
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1180
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1180 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:748
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1180 CREDAT:406532 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1948
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1744
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1548
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1548 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1268

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{69194EF1-70B1-11ED-A70D-7AAB9C3024C2}.dat

    Filesize

    5KB

    MD5

    688bbbf1b04249400aa07616f3a40f21

    SHA1

    e1efa80d1e6ad50607305186ce89b3176cee754f

    SHA256

    f0c636ea9b53d1586cfef7258e1a798334839e09d6b014f1a79d71b42af86a4c

    SHA512

    834c09c0655db126f2fe968719477273387688d03e16f36966647139a5d94ddfb2bcd9bed22cfc4f9354fb5ddd0fe7241e10dc69336d436a1ec192f2a1db4ff3

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{69194EF1-70B1-11ED-A70D-7AAB9C3024C2}.dat

    Filesize

    1KB

    MD5

    72f5c05b7ea8dd6059bf59f50b22df33

    SHA1

    d5af52e129e15e3a34772806f6c5fbf132e7408e

    SHA256

    1dc0c8d7304c177ad0e74d3d2f1002eb773f4b180685a7df6bbe75ccc24b0164

    SHA512

    6ff1e2e6b99bd0a4ed7ca8a9e943551bcd73a0befcace6f1b1106e88595c0846c9bb76ca99a33266ffec2440cf6a440090f803abbf28b208a6c7bc6310beb39e

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{69197601-70B1-11ED-A70D-7AAB9C3024C2}.dat

    Filesize

    1KB

    MD5

    72f5c05b7ea8dd6059bf59f50b22df33

    SHA1

    d5af52e129e15e3a34772806f6c5fbf132e7408e

    SHA256

    1dc0c8d7304c177ad0e74d3d2f1002eb773f4b180685a7df6bbe75ccc24b0164

    SHA512

    6ff1e2e6b99bd0a4ed7ca8a9e943551bcd73a0befcace6f1b1106e88595c0846c9bb76ca99a33266ffec2440cf6a440090f803abbf28b208a6c7bc6310beb39e

  • C:\Users\Admin\AppData\Local\Temp\8b06a262bc18bcb8d10d3a697a698d63a180bb093d019bfac10e455bfa38b41fmgr.exe

    Filesize

    104KB

    MD5

    84b7783804fa7506672a409e9899c6be

    SHA1

    2da8a6e9c04662564e18cdf98f73e224a5662533

    SHA256

    b26a93c17ac6a412c6c191aa6a1543537f3185fe813c24153c6dec736fbad4ef

    SHA512

    8a867296b05f45dd79ab64b11b6cc0cc8fad835b2f5ba9b8469981cc9b3e15c91f98b688cbe7addfab7ea2bd55a1d475fc853c004afb24be1b5691f8183c897c

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\VXAXHUB6.txt

    Filesize

    608B

    MD5

    405e875d8b8c364cf5dfcb9b0d0e97f1

    SHA1

    d42b205e53caacfb77da2a6621f4dab90f551d17

    SHA256

    9834c30480e4db614f0a36846c7978475dc5f3c429a3cd7957c88dadb61b9da4

    SHA512

    050e7df0e46736c67ffbbabb63f622d1182aecdef15c882fa60f8f7d6d3de9288f0d9c90e45037373a0795f5a1fbe17bfaa5b24722720e7d7db3e81095d1cae6

  • \Users\Admin\AppData\Local\Temp\8b06a262bc18bcb8d10d3a697a698d63a180bb093d019bfac10e455bfa38b41fmgr.exe

    Filesize

    104KB

    MD5

    84b7783804fa7506672a409e9899c6be

    SHA1

    2da8a6e9c04662564e18cdf98f73e224a5662533

    SHA256

    b26a93c17ac6a412c6c191aa6a1543537f3185fe813c24153c6dec736fbad4ef

    SHA512

    8a867296b05f45dd79ab64b11b6cc0cc8fad835b2f5ba9b8469981cc9b3e15c91f98b688cbe7addfab7ea2bd55a1d475fc853c004afb24be1b5691f8183c897c

  • \Users\Admin\AppData\Local\Temp\8b06a262bc18bcb8d10d3a697a698d63a180bb093d019bfac10e455bfa38b41fmgr.exe

    Filesize

    104KB

    MD5

    84b7783804fa7506672a409e9899c6be

    SHA1

    2da8a6e9c04662564e18cdf98f73e224a5662533

    SHA256

    b26a93c17ac6a412c6c191aa6a1543537f3185fe813c24153c6dec736fbad4ef

    SHA512

    8a867296b05f45dd79ab64b11b6cc0cc8fad835b2f5ba9b8469981cc9b3e15c91f98b688cbe7addfab7ea2bd55a1d475fc853c004afb24be1b5691f8183c897c

  • memory/1632-79-0x0000000000370000-0x00000000003DA000-memory.dmp

    Filesize

    424KB

  • memory/1632-87-0x0000000000370000-0x00000000003DA000-memory.dmp

    Filesize

    424KB

  • memory/1632-60-0x0000000000220000-0x0000000000276000-memory.dmp

    Filesize

    344KB

  • memory/1632-115-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/1632-65-0x0000000000370000-0x00000000003DA000-memory.dmp

    Filesize

    424KB

  • memory/1632-67-0x0000000000370000-0x00000000003DA000-memory.dmp

    Filesize

    424KB

  • memory/1632-69-0x0000000000370000-0x00000000003DA000-memory.dmp

    Filesize

    424KB

  • memory/1632-71-0x0000000000370000-0x00000000003DA000-memory.dmp

    Filesize

    424KB

  • memory/1632-73-0x0000000000370000-0x00000000003DA000-memory.dmp

    Filesize

    424KB

  • memory/1632-75-0x0000000000370000-0x00000000003DA000-memory.dmp

    Filesize

    424KB

  • memory/1632-77-0x0000000000370000-0x00000000003DA000-memory.dmp

    Filesize

    424KB

  • memory/1632-54-0x00000000757B1000-0x00000000757B3000-memory.dmp

    Filesize

    8KB

  • memory/1632-81-0x0000000000370000-0x00000000003DA000-memory.dmp

    Filesize

    424KB

  • memory/1632-83-0x0000000000370000-0x00000000003DA000-memory.dmp

    Filesize

    424KB

  • memory/1632-85-0x0000000000370000-0x00000000003DA000-memory.dmp

    Filesize

    424KB

  • memory/1632-59-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/1632-89-0x0000000000370000-0x00000000003DA000-memory.dmp

    Filesize

    424KB

  • memory/1632-91-0x0000000000370000-0x00000000003DA000-memory.dmp

    Filesize

    424KB

  • memory/1632-95-0x0000000000370000-0x00000000003DA000-memory.dmp

    Filesize

    424KB

  • memory/1632-93-0x0000000000370000-0x00000000003DA000-memory.dmp

    Filesize

    424KB

  • memory/1632-97-0x0000000000370000-0x00000000003DA000-memory.dmp

    Filesize

    424KB

  • memory/1632-99-0x0000000000370000-0x00000000003DA000-memory.dmp

    Filesize

    424KB

  • memory/1632-101-0x0000000000370000-0x00000000003DA000-memory.dmp

    Filesize

    424KB

  • memory/1632-103-0x0000000000370000-0x00000000003DA000-memory.dmp

    Filesize

    424KB

  • memory/1632-105-0x0000000000370000-0x00000000003DA000-memory.dmp

    Filesize

    424KB

  • memory/1632-111-0x0000000000370000-0x00000000003DA000-memory.dmp

    Filesize

    424KB

  • memory/1632-109-0x0000000000370000-0x00000000003DA000-memory.dmp

    Filesize

    424KB

  • memory/1632-107-0x0000000000370000-0x00000000003DA000-memory.dmp

    Filesize

    424KB

  • memory/1648-61-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB

  • memory/1648-64-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB