Analysis

  • max time kernel
    119s
  • max time network
    189s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 13:41

General

  • Target

    1e061d17ed2f09115446a86883259be650c0dc6f11e6db3631882194760e94da.dll

  • Size

    712KB

  • MD5

    b0598f603501f4c19c6b5e12bbad0140

  • SHA1

    58abbab28c4290b4acf8c06b211cd0a495a5cad7

  • SHA256

    1e061d17ed2f09115446a86883259be650c0dc6f11e6db3631882194760e94da

  • SHA512

    5ea1551674e23d26899cc2763cf34c071dedc9b804d944b9738c850fa553ea1059fef8432cf3e026c182ea5d0748bf8b0511ec76a3b01fd16362e95cbebf5876

  • SSDEEP

    12288:KehnaNPpSVZmNxRCwnwm3W3OHIIf5Gs/Yklv44iNAzQxBJ:Keh0PpS6NxNnwYeOHXwKYwtiN3l

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 53 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\1e061d17ed2f09115446a86883259be650c0dc6f11e6db3631882194760e94da.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:240
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\1e061d17ed2f09115446a86883259be650c0dc6f11e6db3631882194760e94da.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:1732
      • C:\Windows\SysWOW64\rundll32mgr.exe
        C:\Windows\SysWOW64\rundll32mgr.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:940
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1340
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1340 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:384
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1728
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1540

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{4C465501-7806-11ED-9551-6E705F4A26E5}.dat

          Filesize

          5KB

          MD5

          ac305da3697933e990a6bca20f65b158

          SHA1

          4d0cf53e5bf994b6606c9ef9354d586ccb33a137

          SHA256

          3ada8e69735b5206fd4edafc13fc99b7d8051a2616c431d34c33cdd35c2e612a

          SHA512

          ee17c1c304027096087f70ffbfbb22db413d3cfca473e4ef2ce47b384386188e30cd1521ab57d8083b8740396b0ade25fc3863871103d5aad76bf7a8d4194095

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{4C47B491-7806-11ED-9551-6E705F4A26E5}.dat

          Filesize

          3KB

          MD5

          1023dee2ed8d382c0a5f5fe3542b8443

          SHA1

          131716d9283dad2f8e3f642f1674e98cfde1ed07

          SHA256

          c600708c2f3adbe338a81db032f985ebec4511d37f0a1c52fb41239928307757

          SHA512

          e9a9642ff3b3bb83993c7da13fc36f14c38940b2c47f2eedc137eda532c799cf182797a4cc7a39c10ce6e655489b01f693973e42ea24ae29cb2bc6b1a1cc1d08

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\YZHLRVXM.txt

          Filesize

          608B

          MD5

          d879d3687ccf5a1819f7dfbed732fd28

          SHA1

          6607a2e755ff7759f7512fa1e894e0aea068bd60

          SHA256

          15b9283915c69b568be4f0bd189e5ce6277b3cf962621b3d75cc3d76e04a82c8

          SHA512

          e0ac26cb6d526a6551eedef2ee5ba19e2e54a271c74922b0cabff566eda2d487d2e02fd93b8ae2ff71670d596d0bb731240e2334757af6350dc3d1f8222611f8

        • C:\Windows\SysWOW64\rundll32mgr.exe

          Filesize

          329KB

          MD5

          b9fafc0d8b37b03f15cb13306f83876c

          SHA1

          9ff757465fd46ef2d9d56c5e57a202f57cd06217

          SHA256

          b3016e8e6380563a2359bb84dc97cb81cc4638d9a52b48d49e576a8d777f65d1

          SHA512

          68a99095a0d24278cfa2f5700c16ee3459813cd31d10f5d8d38cac2c4dedfcdb3b05eb197b061f473965f000d869420fe279c6096a695414fec7de5c40a346eb

        • \Windows\SysWOW64\rundll32mgr.exe

          Filesize

          329KB

          MD5

          b9fafc0d8b37b03f15cb13306f83876c

          SHA1

          9ff757465fd46ef2d9d56c5e57a202f57cd06217

          SHA256

          b3016e8e6380563a2359bb84dc97cb81cc4638d9a52b48d49e576a8d777f65d1

          SHA512

          68a99095a0d24278cfa2f5700c16ee3459813cd31d10f5d8d38cac2c4dedfcdb3b05eb197b061f473965f000d869420fe279c6096a695414fec7de5c40a346eb

        • \Windows\SysWOW64\rundll32mgr.exe

          Filesize

          329KB

          MD5

          b9fafc0d8b37b03f15cb13306f83876c

          SHA1

          9ff757465fd46ef2d9d56c5e57a202f57cd06217

          SHA256

          b3016e8e6380563a2359bb84dc97cb81cc4638d9a52b48d49e576a8d777f65d1

          SHA512

          68a99095a0d24278cfa2f5700c16ee3459813cd31d10f5d8d38cac2c4dedfcdb3b05eb197b061f473965f000d869420fe279c6096a695414fec7de5c40a346eb

        • memory/940-60-0x0000000000400000-0x000000000046A000-memory.dmp

          Filesize

          424KB

        • memory/940-63-0x0000000000400000-0x000000000046A000-memory.dmp

          Filesize

          424KB

        • memory/1732-55-0x0000000074AB1000-0x0000000074AB3000-memory.dmp

          Filesize

          8KB