Resubmissions

14/11/2023, 17:31 UTC

231114-v3qg7acf42 10

14/11/2023, 17:21 UTC

231114-vxdw7sdg61 10

28/10/2023, 19:29 UTC

231028-x7cs1age56 10

24/10/2023, 13:29 UTC

231024-qrn3rsdb6z 10

18/10/2023, 12:04 UTC

231018-n8ybnaeb31 10

07/09/2023, 12:10 UTC

230907-pce1wahe2x 10

Analysis

  • max time kernel
    436s
  • max time network
    445s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/10/2023, 13:29 UTC

General

  • Target

    5f3bfe76bbd22dd8fd936b3833220ba03964b08e28ecf13dafdbbae24a620cb6.exe

  • Size

    117KB

  • MD5

    9a97fcbfb92a1cd2bea185320ffb8d77

  • SHA1

    6796d5101d50fa0f0689bf0c4201a39f37b10151

  • SHA256

    5f3bfe76bbd22dd8fd936b3833220ba03964b08e28ecf13dafdbbae24a620cb6

  • SHA512

    64a8df2bc8db6f32268858eb40af4e1912f755bbad40e1c807330e11a2b791d9a8ea29912b00ab258291c90a95c3ffa4ec4120c392d04a06dbba30f3c4e32155

  • SSDEEP

    3072:GiYoDJ9UIfLL6y5KxDObWClw5jsNezaiY4d1tok:GijF9UIfLL6ywxabWClujsNH4d1X

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies firewall policy service 2 TTPs 3 IoCs
  • Modifies security service 2 TTPs 3 IoCs
  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 6 IoCs
  • Drops startup file 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f3bfe76bbd22dd8fd936b3833220ba03964b08e28ecf13dafdbbae24a620cb6.exe
    "C:\Users\Admin\AppData\Local\Temp\5f3bfe76bbd22dd8fd936b3833220ba03964b08e28ecf13dafdbbae24a620cb6.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies firewall policy service
    • Modifies security service
    • UAC bypass
    • Windows security bypass
    • Drops startup file
    • Windows security modification
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • System policy modification
    PID:3352

Network

  • flag-us
    DNS
    29.81.57.23.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    29.81.57.23.in-addr.arpa
    IN PTR
    Response
    29.81.57.23.in-addr.arpa
    IN PTR
    a23-57-81-29deploystaticakamaitechnologiescom
  • flag-us
    DNS
    126.23.238.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    126.23.238.8.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    73.159.190.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    73.159.190.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    241.154.82.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    241.154.82.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    86.23.85.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    86.23.85.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    171.39.242.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    171.39.242.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    1.208.79.178.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    1.208.79.178.in-addr.arpa
    IN PTR
    Response
    1.208.79.178.in-addr.arpa
    IN PTR
    https-178-79-208-1amsllnwnet
  • flag-us
    DNS
    13.227.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    13.227.111.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    9.173.189.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    9.173.189.20.in-addr.arpa
    IN PTR
    Response
No results found
  • 8.8.8.8:53
    29.81.57.23.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    29.81.57.23.in-addr.arpa

  • 8.8.8.8:53
    126.23.238.8.in-addr.arpa
    dns
    71 B
    125 B
    1
    1

    DNS Request

    126.23.238.8.in-addr.arpa

  • 8.8.8.8:53
    73.159.190.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    73.159.190.20.in-addr.arpa

  • 8.8.8.8:53
    241.154.82.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    241.154.82.20.in-addr.arpa

  • 8.8.8.8:53
    86.23.85.13.in-addr.arpa
    dns
    70 B
    144 B
    1
    1

    DNS Request

    86.23.85.13.in-addr.arpa

  • 8.8.8.8:53
    171.39.242.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    171.39.242.20.in-addr.arpa

  • 8.8.8.8:53
    1.208.79.178.in-addr.arpa
    dns
    71 B
    116 B
    1
    1

    DNS Request

    1.208.79.178.in-addr.arpa

  • 8.8.8.8:53
    13.227.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    13.227.111.52.in-addr.arpa

  • 8.8.8.8:53
    9.173.189.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    9.173.189.20.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3352-0-0x0000000015190000-0x00000000151CD000-memory.dmp

    Filesize

    244KB

  • memory/3352-2-0x0000000015190000-0x00000000151CD000-memory.dmp

    Filesize

    244KB

  • memory/3352-1-0x0000000000760000-0x0000000000761000-memory.dmp

    Filesize

    4KB

  • memory/3352-3-0x0000000000770000-0x0000000000771000-memory.dmp

    Filesize

    4KB

  • memory/3352-5-0x0000000015190000-0x00000000151CD000-memory.dmp

    Filesize

    244KB

  • memory/3352-6-0x0000000015190000-0x00000000151CD000-memory.dmp

    Filesize

    244KB

  • memory/3352-7-0x0000000015190000-0x00000000151CD000-memory.dmp

    Filesize

    244KB

  • memory/3352-11-0x0000000015190000-0x00000000151CD000-memory.dmp

    Filesize

    244KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.