Analysis

  • max time kernel
    91s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 13:41

General

  • Target

    25219ad407cb26ac174799adaf6ffb23b3697c3376aa8e072b0271d5b0ab5ce5.dll

  • Size

    279KB

  • MD5

    69fb1b89d99533adf5313be733e69cb0

  • SHA1

    0a4311679e277ca491192dc97caf1631b9742618

  • SHA256

    25219ad407cb26ac174799adaf6ffb23b3697c3376aa8e072b0271d5b0ab5ce5

  • SHA512

    ca4d1e7e35187d4cba6bda66cba72bb524dbf225e901dbcdd20833da96d2248c2bca4379d1ea4f87263e4b992951c2b1c31a6b7730854392a94f276828722161

  • SSDEEP

    6144:ArkYHjIWeWcd71bynCoYh6ULa7U6+VSiJ:BYHjIWPo71boYs7w6GS6

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • UPX packed file 12 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Program crash 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\25219ad407cb26ac174799adaf6ffb23b3697c3376aa8e072b0271d5b0ab5ce5.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4864
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\25219ad407cb26ac174799adaf6ffb23b3697c3376aa8e072b0271d5b0ab5ce5.dll,#1
      2⤵
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2068
      • C:\Windows\SysWOW64\rundll32mgr.exe
        C:\Windows\SysWOW64\rundll32mgr.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:2432
        • C:\Program Files (x86)\Microsoft\WaterMark.exe
          "C:\Program Files (x86)\Microsoft\WaterMark.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of UnmapMainImage
          • Suspicious use of WriteProcessMemory
          PID:2052
          • C:\Windows\SysWOW64\svchost.exe
            C:\Windows\system32\svchost.exe
            5⤵
              PID:4896
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4896 -s 212
                6⤵
                • Program crash
                PID:4268
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              5⤵
              • Modifies Internet Explorer settings
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:4352
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4352 CREDAT:17410 /prefetch:2
                6⤵
                • Modifies Internet Explorer settings
                • Suspicious use of SetWindowsHookEx
                PID:872
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              5⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:4604
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4604 CREDAT:17410 /prefetch:2
                6⤵
                • Modifies Internet Explorer settings
                • Suspicious use of SetWindowsHookEx
                PID:4176
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2068 -s 608
          3⤵
          • Program crash
          PID:5116
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2068 -ip 2068
      1⤵
        PID:2960
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4896 -ip 4896
        1⤵
          PID:3356

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Microsoft\WaterMark.exe

          Filesize

          112KB

          MD5

          d991de961bb094d782cdba825249bb59

          SHA1

          695b3ede0c83cfec976b10ec38606ab912a7074b

          SHA256

          9d1853688bce399ed5ef5c8e76dd3ddffa6d15a0b29a9eb11e5746dce781fd9c

          SHA512

          10aca884bd85145ddc64181d21eb97ce837988029261bbe04c6dd0ceb2d12c88e34bba59c80879b7be7857c10ca46478613cce10da32f86aa2e24de3192f6146

        • C:\Program Files (x86)\Microsoft\WaterMark.exe

          Filesize

          112KB

          MD5

          d991de961bb094d782cdba825249bb59

          SHA1

          695b3ede0c83cfec976b10ec38606ab912a7074b

          SHA256

          9d1853688bce399ed5ef5c8e76dd3ddffa6d15a0b29a9eb11e5746dce781fd9c

          SHA512

          10aca884bd85145ddc64181d21eb97ce837988029261bbe04c6dd0ceb2d12c88e34bba59c80879b7be7857c10ca46478613cce10da32f86aa2e24de3192f6146

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          2e02780939de763a8bb3e91dfbf21980

          SHA1

          47e818dcbc1d307b43654dfe3a03b9a7625d9ce4

          SHA256

          971abb405a443302f8c61627933bd0f46ed6953f5815e298974e6f7532908748

          SHA512

          51709ae31e885719d848f619c4b3e732b0765a5349484f7c4ca524072a6b0d75f33d3f6c015a0ed4fd188a43d5cc9e0d221d1d7cca5a31a044b73fcbcebbe5fd

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          434B

          MD5

          741481c8bb71e5e9f1978d7bb1ff5d28

          SHA1

          ae60f289a91acb598595890d1916a6c5c1443a18

          SHA256

          d41976c5e39043c2d93ab57a3bacc3eb1bbc08552b0e927414de4f28e457b42d

          SHA512

          07f746cb2fddd263cc636e804a15543a5f433f124aef34b7976eb373e0c1ba61f596e6d87cc7d6640a6e2b99fd5e832e2f41a9e3fb3030bd294cb0150116498e

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{079727D4-7801-11ED-A0EE-C243EF799EB6}.dat

          Filesize

          3KB

          MD5

          0bc509807d4c97581990f1bd7d8f9a28

          SHA1

          5dcaec15a8fc36fafaf9cb0cee19c47dee1858e5

          SHA256

          d125ed87de13fb357db90ead2428fcdf0397ba0533bfd80590cf55e84f6e582d

          SHA512

          a083cd22b13030f2c635b45168e441aeb71c34d7c8eea89bd8877383769954154ab457bc490cf37a822455d9f0228de0b919c3c991e9cf0d79e8fe025704c783

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{079BEE17-7801-11ED-A0EE-C243EF799EB6}.dat

          Filesize

          5KB

          MD5

          c388a36266b3e7f627bf1350c7cdecd0

          SHA1

          642fe48c20a9fb3b7aa2315d00a164a15e9a298f

          SHA256

          e47e4db2f657d48dd2296d1fd6b34d2681b334921056bcf3454c966370e1a7a2

          SHA512

          465ebff6f23fef6ceac6b1f9161446ea89de2c9ac7be88a4c1f7b5a20cbc3a49613859d2e0ff9849b2e37f2e78e7ae289112b2b89b3f6c4b3b2f675bd164c0f8

        • C:\Windows\SysWOW64\rundll32mgr.exe

          Filesize

          112KB

          MD5

          d991de961bb094d782cdba825249bb59

          SHA1

          695b3ede0c83cfec976b10ec38606ab912a7074b

          SHA256

          9d1853688bce399ed5ef5c8e76dd3ddffa6d15a0b29a9eb11e5746dce781fd9c

          SHA512

          10aca884bd85145ddc64181d21eb97ce837988029261bbe04c6dd0ceb2d12c88e34bba59c80879b7be7857c10ca46478613cce10da32f86aa2e24de3192f6146

        • C:\Windows\SysWOW64\rundll32mgr.exe

          Filesize

          112KB

          MD5

          d991de961bb094d782cdba825249bb59

          SHA1

          695b3ede0c83cfec976b10ec38606ab912a7074b

          SHA256

          9d1853688bce399ed5ef5c8e76dd3ddffa6d15a0b29a9eb11e5746dce781fd9c

          SHA512

          10aca884bd85145ddc64181d21eb97ce837988029261bbe04c6dd0ceb2d12c88e34bba59c80879b7be7857c10ca46478613cce10da32f86aa2e24de3192f6146

        • memory/2052-150-0x0000000000400000-0x0000000000426000-memory.dmp

          Filesize

          152KB

        • memory/2052-161-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/2052-160-0x0000000000400000-0x0000000000426000-memory.dmp

          Filesize

          152KB

        • memory/2052-147-0x0000000000400000-0x0000000000426000-memory.dmp

          Filesize

          152KB

        • memory/2052-158-0x0000000000400000-0x0000000000426000-memory.dmp

          Filesize

          152KB

        • memory/2052-159-0x0000000000400000-0x0000000000426000-memory.dmp

          Filesize

          152KB

        • memory/2052-154-0x0000000000400000-0x0000000000426000-memory.dmp

          Filesize

          152KB

        • memory/2052-155-0x0000000000400000-0x0000000000426000-memory.dmp

          Filesize

          152KB

        • memory/2068-143-0x0000000074E90000-0x0000000074EDB000-memory.dmp

          Filesize

          300KB

        • memory/2432-144-0x0000000000400000-0x0000000000426000-memory.dmp

          Filesize

          152KB

        • memory/2432-139-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/2432-145-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/2432-138-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB