Analysis

  • max time kernel
    165s
  • max time network
    193s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2022, 02:04

General

  • Target

    9a2aaf533a5c7edb2c30f9da3adea44cf6c4b7c35f6effc0669cecb259c6e8cc.dll

  • Size

    104KB

  • MD5

    69972048c85c1511e33338a9da653a10

  • SHA1

    1e8f42b31834ffc3deba86856a063f80fff6e735

  • SHA256

    9a2aaf533a5c7edb2c30f9da3adea44cf6c4b7c35f6effc0669cecb259c6e8cc

  • SHA512

    0d7a77cf0740c1cb74257aa4d273284ee5307d7ccb03591541fead7bb84d607b8d1e52821cee75ce14fd30e70daa388ac96f0efc570941b27f094fdfb2bcd053

  • SSDEEP

    3072:3FVd8ng8PHzV+NfJG+a+kj36SB50Att2Az:3Hdj8PHp+9Jm+g3t5tEAz

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Program crash 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\9a2aaf533a5c7edb2c30f9da3adea44cf6c4b7c35f6effc0669cecb259c6e8cc.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3792
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\9a2aaf533a5c7edb2c30f9da3adea44cf6c4b7c35f6effc0669cecb259c6e8cc.dll,#1
      2⤵
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:1800
      • C:\Windows\SysWOW64\rundll32mgr.exe
        C:\Windows\SysWOW64\rundll32mgr.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:3172
        • C:\Program Files (x86)\Microsoft\WaterMark.exe
          "C:\Program Files (x86)\Microsoft\WaterMark.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of UnmapMainImage
          • Suspicious use of WriteProcessMemory
          PID:2584
          • C:\Windows\SysWOW64\svchost.exe
            C:\Windows\system32\svchost.exe
            5⤵
              PID:3956
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3956 -s 212
                6⤵
                • Program crash
                PID:452
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              5⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2708
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2708 CREDAT:17410 /prefetch:2
                6⤵
                • Modifies Internet Explorer settings
                • Suspicious use of SetWindowsHookEx
                PID:1976
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              5⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:5116
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5116 CREDAT:17410 /prefetch:2
                6⤵
                • Modifies Internet Explorer settings
                • Suspicious use of SetWindowsHookEx
                PID:3004
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1800 -s 608
          3⤵
          • Program crash
          PID:3064
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1800 -ip 1800
      1⤵
        PID:4040
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3956 -ip 3956
        1⤵
          PID:3540

        Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Program Files (x86)\Microsoft\WaterMark.exe

                Filesize

                59KB

                MD5

                0e0f0ae845d89c22bb6385f64a6b85fd

                SHA1

                0f3f1e7f18ab81572c5ce938d3880d4a5d7100ac

                SHA256

                5a5b85c582d5d4b3b912ee6789babebf8ae6d87330d0d33d87274841952899dd

                SHA512

                baec989a6329a2a60d954e83279fd57ba2000f8ed79e7a02d145bf44a5bffcd9a831c63f4b7d44e40c51e40b1dfbe72c5cebac04d0ce7b2295e3fd191b122350

              • C:\Program Files (x86)\Microsoft\WaterMark.exe

                Filesize

                59KB

                MD5

                0e0f0ae845d89c22bb6385f64a6b85fd

                SHA1

                0f3f1e7f18ab81572c5ce938d3880d4a5d7100ac

                SHA256

                5a5b85c582d5d4b3b912ee6789babebf8ae6d87330d0d33d87274841952899dd

                SHA512

                baec989a6329a2a60d954e83279fd57ba2000f8ed79e7a02d145bf44a5bffcd9a831c63f4b7d44e40c51e40b1dfbe72c5cebac04d0ce7b2295e3fd191b122350

              • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{B1DC848A-7632-11ED-BF5F-66CD4AA2E676}.dat

                Filesize

                3KB

                MD5

                be6e4128433d28691519ce9eb273ef22

                SHA1

                f5383161c5b9e6e76d0045c0545781ade1f0f53c

                SHA256

                3b77c3b54072ebb32858c2425a80750ae5fdfb56ed5a7a12fddeb1335c7137c9

                SHA512

                c43f70fbb73c25e16cfc195679b3f424220f3e2c567c230119cbe83357f21b091ac21af9746e540ea9113560d63187c3aa12bfbfad63191c259699d3f9e788bb

              • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{B1DEE63E-7632-11ED-BF5F-66CD4AA2E676}.dat

                Filesize

                3KB

                MD5

                3508bcfcc869071db03bf92a2ed3cfcf

                SHA1

                9cb0435409bba82bf2243e1ff47b036be0e42b63

                SHA256

                0618a92fa8f171e95e36e8ea779741d4d1985951f38b212aaa6ddb8c4fd79991

                SHA512

                f6c973258ede4c33dfe9ae89676e013da4513c4cbd7f221d489786dada65fa25d906a0d637a7136bfcdae195fbb39e66acf65d12a5cbcfabadabbeb66a776b8f

              • C:\Windows\SysWOW64\rundll32mgr.exe

                Filesize

                59KB

                MD5

                0e0f0ae845d89c22bb6385f64a6b85fd

                SHA1

                0f3f1e7f18ab81572c5ce938d3880d4a5d7100ac

                SHA256

                5a5b85c582d5d4b3b912ee6789babebf8ae6d87330d0d33d87274841952899dd

                SHA512

                baec989a6329a2a60d954e83279fd57ba2000f8ed79e7a02d145bf44a5bffcd9a831c63f4b7d44e40c51e40b1dfbe72c5cebac04d0ce7b2295e3fd191b122350

              • C:\Windows\SysWOW64\rundll32mgr.exe

                Filesize

                59KB

                MD5

                0e0f0ae845d89c22bb6385f64a6b85fd

                SHA1

                0f3f1e7f18ab81572c5ce938d3880d4a5d7100ac

                SHA256

                5a5b85c582d5d4b3b912ee6789babebf8ae6d87330d0d33d87274841952899dd

                SHA512

                baec989a6329a2a60d954e83279fd57ba2000f8ed79e7a02d145bf44a5bffcd9a831c63f4b7d44e40c51e40b1dfbe72c5cebac04d0ce7b2295e3fd191b122350

              • memory/1800-150-0x000000006D140000-0x000000006D15A000-memory.dmp

                Filesize

                104KB

              • memory/2584-157-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB

              • memory/2584-155-0x0000000000400000-0x0000000000423000-memory.dmp

                Filesize

                140KB

              • memory/2584-156-0x0000000000400000-0x0000000000423000-memory.dmp

                Filesize

                140KB

              • memory/2584-151-0x0000000000400000-0x0000000000423000-memory.dmp

                Filesize

                140KB

              • memory/2584-152-0x0000000000400000-0x0000000000423000-memory.dmp

                Filesize

                140KB

              • memory/2584-153-0x0000000000400000-0x0000000000423000-memory.dmp

                Filesize

                140KB

              • memory/2584-154-0x0000000000400000-0x0000000000423000-memory.dmp

                Filesize

                140KB

              • memory/3172-139-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB

              • memory/3172-142-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB

              • memory/3172-138-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB