Analysis

  • max time kernel
    112s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 04:14

General

  • Target

    5b3c15f3e60758ed44ebf5dce2abeaf9fe0475c16dab35995cf318e4d993d8e2.exe

  • Size

    112KB

  • MD5

    262e57d537f71ef126edd5debe003bfd

  • SHA1

    a057c77f61fbe3e5564ddc38b1b5b1b53455abb9

  • SHA256

    5b3c15f3e60758ed44ebf5dce2abeaf9fe0475c16dab35995cf318e4d993d8e2

  • SHA512

    ef443c486d07f43c07f0c31081829e8c6269c2bd0bd18007cdafc83e04a6d7557feed55e409eeb01b1a0b1fa304ec77549ed777f3ced1263d96f4b40245b928b

  • SSDEEP

    1536:rVZnxm6MG9xgfrvEaoiT/GyphjXDYjKwttoswRmhApEjD0N9Y6js+uTAbee8:jnxwgxgfR/DVG7wBpEsNDj4Aq

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b3c15f3e60758ed44ebf5dce2abeaf9fe0475c16dab35995cf318e4d993d8e2.exe
    "C:\Users\Admin\AppData\Local\Temp\5b3c15f3e60758ed44ebf5dce2abeaf9fe0475c16dab35995cf318e4d993d8e2.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:4988
    • C:\Program Files (x86)\Microsoft\WaterMark.exe
      "C:\Program Files (x86)\Microsoft\WaterMark.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:4372
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\system32\svchost.exe
        3⤵
          PID:540
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 540 -s 204
            4⤵
            • Program crash
            PID:1416
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1436
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1436 CREDAT:17410 /prefetch:2
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:3628
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4236
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4236 CREDAT:17410 /prefetch:2
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:4820
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 540 -ip 540
      1⤵
        PID:3268

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Microsoft\WaterMark.exe

              Filesize

              112KB

              MD5

              262e57d537f71ef126edd5debe003bfd

              SHA1

              a057c77f61fbe3e5564ddc38b1b5b1b53455abb9

              SHA256

              5b3c15f3e60758ed44ebf5dce2abeaf9fe0475c16dab35995cf318e4d993d8e2

              SHA512

              ef443c486d07f43c07f0c31081829e8c6269c2bd0bd18007cdafc83e04a6d7557feed55e409eeb01b1a0b1fa304ec77549ed777f3ced1263d96f4b40245b928b

            • C:\Program Files (x86)\Microsoft\WaterMark.exe

              Filesize

              112KB

              MD5

              262e57d537f71ef126edd5debe003bfd

              SHA1

              a057c77f61fbe3e5564ddc38b1b5b1b53455abb9

              SHA256

              5b3c15f3e60758ed44ebf5dce2abeaf9fe0475c16dab35995cf318e4d993d8e2

              SHA512

              ef443c486d07f43c07f0c31081829e8c6269c2bd0bd18007cdafc83e04a6d7557feed55e409eeb01b1a0b1fa304ec77549ed777f3ced1263d96f4b40245b928b

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

              Filesize

              471B

              MD5

              4132c54f59c529167c112e7f519120fa

              SHA1

              94cc9036fa031258aa744c7ee88e3c0b6c7a73da

              SHA256

              e9f456cf8bb8cc4a683d1c2f792feeb4c83fff24a86e6bcb260eff8fbff126fb

              SHA512

              e8efb8e81a90ffbe177301fbba4470ded104fc6d12cfa0123938b981d612eb2c4a66bb47b585cd43ed6ed4940e0ad5a1e3a5d9d18f8cb643e741aae694c4baee

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

              Filesize

              471B

              MD5

              4132c54f59c529167c112e7f519120fa

              SHA1

              94cc9036fa031258aa744c7ee88e3c0b6c7a73da

              SHA256

              e9f456cf8bb8cc4a683d1c2f792feeb4c83fff24a86e6bcb260eff8fbff126fb

              SHA512

              e8efb8e81a90ffbe177301fbba4470ded104fc6d12cfa0123938b981d612eb2c4a66bb47b585cd43ed6ed4940e0ad5a1e3a5d9d18f8cb643e741aae694c4baee

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

              Filesize

              434B

              MD5

              e19e47547ed8d79424ec7106cb3a4c84

              SHA1

              72e21c56d0d9dc0e93d279a053887628e32e49d4

              SHA256

              5617ae5af5c4f48bcbf2000e05d43ee6eec27d19f910a9ba7d55db64745b0a46

              SHA512

              18e7c08f7999734e18e26a592521c198189e5192f34f6d87bc178e74896404e2609adb11406e0ad1f51f833bf9a5ffd2e13debb711e7939fdeaca06a2d0eaa98

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

              Filesize

              434B

              MD5

              6262a6667870ed491454a0dfeb7b19c8

              SHA1

              e1828a0c5beb4a3fac35c2025ad9e81866cc34ee

              SHA256

              4cb898310e5ee6f20f1a3197d62e67aee1c39f019607fe0c944734972dbab105

              SHA512

              d940e6e4fb685ad547bde8854e213415b80b8111a598a0b24ead60b482b753cc37ecdccd8b52592fff2f94f5ac05c6495754e7660e8a654d58777f2fa4e6dbf1

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

              Filesize

              434B

              MD5

              6262a6667870ed491454a0dfeb7b19c8

              SHA1

              e1828a0c5beb4a3fac35c2025ad9e81866cc34ee

              SHA256

              4cb898310e5ee6f20f1a3197d62e67aee1c39f019607fe0c944734972dbab105

              SHA512

              d940e6e4fb685ad547bde8854e213415b80b8111a598a0b24ead60b482b753cc37ecdccd8b52592fff2f94f5ac05c6495754e7660e8a654d58777f2fa4e6dbf1

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

              Filesize

              434B

              MD5

              6262a6667870ed491454a0dfeb7b19c8

              SHA1

              e1828a0c5beb4a3fac35c2025ad9e81866cc34ee

              SHA256

              4cb898310e5ee6f20f1a3197d62e67aee1c39f019607fe0c944734972dbab105

              SHA512

              d940e6e4fb685ad547bde8854e213415b80b8111a598a0b24ead60b482b753cc37ecdccd8b52592fff2f94f5ac05c6495754e7660e8a654d58777f2fa4e6dbf1

            • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{700F4B7F-72DF-11ED-A0EE-EAB2B6EB986A}.dat

              Filesize

              3KB

              MD5

              567a76000d25c7737e86efcb115d1178

              SHA1

              7997311916cb49e71730006eb3fe68267134045b

              SHA256

              e37e0dba4c0cddf595091d9181df6a21c8a741960e538c6d982036f321126919

              SHA512

              61df9e74d28367cac1b0404e9750c05605035ac4d8580b6114478716af6f0979089a51df00919612c708ed6a528f5a77c5870bb2f552892c3703ede96d546f8b

            • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{70166CF2-72DF-11ED-A0EE-EAB2B6EB986A}.dat

              Filesize

              5KB

              MD5

              e15a658e96ae535edc303531e81b7821

              SHA1

              e8683acde759e7590c42f12b4bc062158c534cad

              SHA256

              1584700f67b894da222028ef7018387cffd3e6523b1a320efaf69a82f67cb0b0

              SHA512

              ea3fa70f678a439c433bda20487cfdda5be7abb6e9d2744dfac119a105aca76512c14b67a876ae4d7b2095277a3d5e959fbfde67019ce87d92f88c45e650e39a

            • memory/4372-149-0x0000000000400000-0x0000000000480000-memory.dmp

              Filesize

              512KB

            • memory/4372-152-0x0000000000400000-0x0000000000480000-memory.dmp

              Filesize

              512KB

            • memory/4372-153-0x0000000000400000-0x0000000000480000-memory.dmp

              Filesize

              512KB

            • memory/4372-154-0x0000000000400000-0x0000000000480000-memory.dmp

              Filesize

              512KB

            • memory/4372-155-0x0000000000400000-0x0000000000421000-memory.dmp

              Filesize

              132KB

            • memory/4372-148-0x0000000000400000-0x0000000000480000-memory.dmp

              Filesize

              512KB

            • memory/4372-147-0x0000000000400000-0x0000000000480000-memory.dmp

              Filesize

              512KB

            • memory/4372-146-0x0000000000400000-0x0000000000480000-memory.dmp

              Filesize

              512KB

            • memory/4988-134-0x0000000000400000-0x0000000000421000-memory.dmp

              Filesize

              132KB

            • memory/4988-139-0x0000000000400000-0x0000000000421000-memory.dmp

              Filesize

              132KB

            • memory/4988-135-0x0000000000400000-0x0000000000421000-memory.dmp

              Filesize

              132KB