Analysis

  • max time kernel
    100s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    04-07-2023 15:17

General

  • Target

    easy_Malicious_001bc26dbd350bf66648eba8a36fe6c5201b8fedbdaad55e272f5f07f305abb8.exe

  • Size

    342KB

  • MD5

    4a5ba8f3079f5208a690f00dda17d1f3

  • SHA1

    a00fd4641c222ed17a11671a6b50a2c631906635

  • SHA256

    ea223f9fae25058864e8333ffba6bde7aa0b38cc58aad3094dfb92198703206f

  • SHA512

    0742ad5cb455783aec1abccbd99c3ca6454bb0f5fb50ecd6ba6937cf7c7accbd7250b51622b1e5034d3feb7de996f236d0ff58d0fc6f4563ce229ce3c0c3b3ac

  • SSDEEP

    6144:BiT0g4vIw+4zzwuSVVFlv0lC17ltL2YC5h7jF+bF/h2i23lFGGjh04Jsm/BWcHPO:Bng4l+IzUXvhZltSd3cx/qVkGjh0Ss4i

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\easy_Malicious_001bc26dbd350bf66648eba8a36fe6c5201b8fedbdaad55e272f5f07f305abb8.exe
    "C:\Users\Admin\AppData\Local\Temp\easy_Malicious_001bc26dbd350bf66648eba8a36fe6c5201b8fedbdaad55e272f5f07f305abb8.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3040
    • C:\Users\Admin\AppData\Local\Temp\easy_Malicious_001bc26dbd350bf66648eba8a36fe6c5201b8fedbdaad55e272f5f07f305abb8mgr.exe
      C:\Users\Admin\AppData\Local\Temp\easy_Malicious_001bc26dbd350bf66648eba8a36fe6c5201b8fedbdaad55e272f5f07f305abb8mgr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:3052
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1756
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1756 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1416

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8ebb9e4128ac35b26446acd5a217b319

    SHA1

    044cf650cde4eb9d8894d81a43c8498deff4375d

    SHA256

    d237412525f83f11a9681e96d3224843a575abdeb07a6a2de74e3a943bf8e511

    SHA512

    7b49a5a2deca86c023ca5861b0b1c87050525acade5230e6b7884b5801ade1c43fab7e20943cfc4a607c3d9dfaa5b1462b9c068dbd7890346604e8de4a9db09e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6be7f9084431e33a014670a85cbd16fc

    SHA1

    1d6fbeb346aa1286b758c3f980cc8e820cf82f74

    SHA256

    19056d03c1018e021e3a1556d0d0a292cb4e63ade4e433584bbaa6ba8358731c

    SHA512

    e6d91d01a68c532b1aa50681669e423d8d533a8063119857d98278a6830a9cbedfeb42efc90dc637c3302d1e557c8f1bfd7d507f85853f8d0da1c3008e611a09

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b4f4cb5d5d5ef6c0d3d37261001ff113

    SHA1

    2917d73badd0c47126befa7ff49613f6c71a5279

    SHA256

    838e4d55ebf5888f30ffa0119d079d0e1cb974d176573519b8014b945b2196d4

    SHA512

    1d0312de375993d11d1e9b2e28e231869466fe30d69d9e00e0f15ddb9acb72d69e43f03640ace5dba2ffabfc7aafce78a6241a6b0c83cfb8ef692b36e793c85b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6fbdad4707f258ff1d68a0296ba1fdff

    SHA1

    3a3979060a484e31372416d3aba4b3a7c6065bcf

    SHA256

    4ca6098191b5093ec9caf9321818bfc5e9e73a173eaf487ca2841a4b3d1fc321

    SHA512

    9b4ec3679f7d2c768ded852d6cbb93f3602b60682e196f0d7876bbf6b5bdfcd386b358a17d4e862fd277c1926f19c5b030223396271311f412cbb909a239df26

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    42316e6faee7119612cc71506d9893b8

    SHA1

    2e4906cfb4f7dc73fba014f304e54437d4892b71

    SHA256

    f53e7440dab75f0afb0c69ccb430304bdfe9016722354cf32bce56de402697fc

    SHA512

    919f0f5885388b8254e8993808ff9007781ef76a3e85f0cdfb48f0b962ea9c7599a590c12d118c83ce3cc3ea7ce7e85ad14d88080d11847652e2ba7a949250de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b84e9ee3b95acaec99dd5677441f4f2a

    SHA1

    4b87fed3cca6e10ef010de3ea5c74f1e6031d026

    SHA256

    b2f7e43d290b03c3860fccef48d85a93f15d560e2d0abbd8c48b99827d493133

    SHA512

    818ed6698bd4b5ad2dbdcc866b25bcca64e6a4ad3e933c5074cca0c0da5059ef59d6bff077cb7093bb5b66aab514c2deef0e7832e4384fe3b17e3540e8d196dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    81869ac433bae101544c1f032729cb9d

    SHA1

    8f6443f206008c71b3b1df8d6dcbcc3448721b02

    SHA256

    f922934bc5a7f38dda90bb48d48f471927bcb5e51102a5f578576a3436593aa1

    SHA512

    8238faa58dc652079e88a558aef4f8e56df993bf903971836f7151ee492a401bf135cd8a1732213f2fff6868db61c22954b9c7ea1ee776a8d8ad030edbbab339

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3aaaf54f9f0217b6df2f17bfb57610cd

    SHA1

    a662ab94b3992aef0c76d725b50ed7561b89907e

    SHA256

    af312ecce53563447bf7113e4a47595283f50706088bb265c328910d66c6fe3f

    SHA512

    ecffe95e148d23903cb2c716a9fbb95a3dda336fe27804c9089922333b06171c8d8f594d896f17d7f541fd3d658c5cb524fbbf946303fbd20227d97de44479e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    655f15106613e742f1d0ca7df100396c

    SHA1

    991a174cd881fb7213fef2ab5c983ceabcb20d7a

    SHA256

    3f2564217b67d67a1acbba9c101c97b4ba57d652eb50e1046ee041604f85e5c0

    SHA512

    be904f7ab8368f61f6933c4892c83975b29706d6f49404e88dd61ca35bb1d6defc77ed5c6b16855d694a8430421f7dc5a14d7bf0dc161d2210913a9365e21a57

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    87e2cb3f0066535238fdcab8c8f84ea2

    SHA1

    446435a2ff56e3ac7881774187ea838f0473e205

    SHA256

    d087763ba9c8992e2f53c70ba2f8f6fd991a1dfa35d763d5e6d2d815798b41d8

    SHA512

    f070577608f9894b10909c306c8c22068c058949a58303d8ad8c331e38b390f5b006d76b02076102e8994285db021ce04c3929106e4ff217127b64f92c4b02e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9f0bd5f07a7bb102f547e0e8d91b2aba

    SHA1

    e73f71ae13243aacf25fc53aca1aecd11f26a355

    SHA256

    5f14fcdd79f62363aad28bc898359e8c98a5927ef4a7be4344c4c9bb43cc1e98

    SHA512

    065d860305050f489c8805861aa367cfbba20e1143517c05a49fbd6fefafe9f8b262cfcc642668d93603c79c34ab9c09f1c76ac2a32b0447c6591d7fb05d324c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\IXTVO3I9\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab3AB4.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar3B33.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Local\Temp\easy_Malicious_001bc26dbd350bf66648eba8a36fe6c5201b8fedbdaad55e272f5f07f305abb8mgr.exe

    Filesize

    88KB

    MD5

    a61ea5f2325332c52bff5bce3d161336

    SHA1

    3a883b8241f5f2efaa76367240db800d78a0209c

    SHA256

    e6f8a54ed663061527ab46b8e8efc2a0f3c99ae77829c0be0e50eb5b1b48415b

    SHA512

    fae031e0e7dcd719240bfe94a3f78d1aac73060324d5b65e0cbe564ce6d6781aaa5e930f0729293e3b502b7d07f53f3a72fb2048d44d93d36851aab8330479e5

  • C:\Users\Admin\AppData\Local\Temp\easy_Malicious_001bc26dbd350bf66648eba8a36fe6c5201b8fedbdaad55e272f5f07f305abb8mgr.exe

    Filesize

    88KB

    MD5

    a61ea5f2325332c52bff5bce3d161336

    SHA1

    3a883b8241f5f2efaa76367240db800d78a0209c

    SHA256

    e6f8a54ed663061527ab46b8e8efc2a0f3c99ae77829c0be0e50eb5b1b48415b

    SHA512

    fae031e0e7dcd719240bfe94a3f78d1aac73060324d5b65e0cbe564ce6d6781aaa5e930f0729293e3b502b7d07f53f3a72fb2048d44d93d36851aab8330479e5

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\V42909F1.txt

    Filesize

    606B

    MD5

    aec3eff36389b3419c841c2aebc97fda

    SHA1

    97e1f5258b64edf70673f9330a925444e928c211

    SHA256

    4bd71b8fd386425cdce44b08174f93f9fa348aa2fa7a0335be5ddd130949a42d

    SHA512

    46beaca6c8f2a670df7d46bf7ca2b8d1759de60266dab787dff05d08800742c776e38fa9645e42080e17974922f42ac10b8a093d289d3a6e41bfbab928b741cc

  • \Users\Admin\AppData\Local\Temp\easy_Malicious_001bc26dbd350bf66648eba8a36fe6c5201b8fedbdaad55e272f5f07f305abb8mgr.exe

    Filesize

    88KB

    MD5

    a61ea5f2325332c52bff5bce3d161336

    SHA1

    3a883b8241f5f2efaa76367240db800d78a0209c

    SHA256

    e6f8a54ed663061527ab46b8e8efc2a0f3c99ae77829c0be0e50eb5b1b48415b

    SHA512

    fae031e0e7dcd719240bfe94a3f78d1aac73060324d5b65e0cbe564ce6d6781aaa5e930f0729293e3b502b7d07f53f3a72fb2048d44d93d36851aab8330479e5

  • \Users\Admin\AppData\Local\Temp\easy_Malicious_001bc26dbd350bf66648eba8a36fe6c5201b8fedbdaad55e272f5f07f305abb8mgr.exe

    Filesize

    88KB

    MD5

    a61ea5f2325332c52bff5bce3d161336

    SHA1

    3a883b8241f5f2efaa76367240db800d78a0209c

    SHA256

    e6f8a54ed663061527ab46b8e8efc2a0f3c99ae77829c0be0e50eb5b1b48415b

    SHA512

    fae031e0e7dcd719240bfe94a3f78d1aac73060324d5b65e0cbe564ce6d6781aaa5e930f0729293e3b502b7d07f53f3a72fb2048d44d93d36851aab8330479e5

  • memory/3040-63-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/3052-69-0x00000000003E0000-0x00000000003E1000-memory.dmp

    Filesize

    4KB

  • memory/3052-62-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/3052-65-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/3052-64-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/3052-66-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/3052-67-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/3052-68-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/3052-71-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/3052-70-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB