Analysis

  • max time kernel
    144s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 19:22

General

  • Target

    0d1a9b4df391b22d3797f0ca3f86e461.exe

  • Size

    157KB

  • MD5

    0d1a9b4df391b22d3797f0ca3f86e461

  • SHA1

    0f2fc84988763fb05680294ba23e68b11a73a8cc

  • SHA256

    58b2384bc46223195fb04972765cef09b3aaff7831c7c48443a9a54db954bef9

  • SHA512

    a1aaa4de3cae86677712338576926fa2ccd1ea4ca95b0b543116e1a00be9b784174a69ac122265c0aa236125e044203bb66be7f4236b7da0fc93d2ce02ec8e5c

  • SSDEEP

    3072:tr6W2wIcju6IIXlNPQmTh907Y6lP/8qkrHK:V6gI4u6lXnxh65Q

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Loads dropped DLL 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Program crash 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d1a9b4df391b22d3797f0ca3f86e461.exe
    "C:\Users\Admin\AppData\Local\Temp\0d1a9b4df391b22d3797f0ca3f86e461.exe"
    1⤵
    • Loads dropped DLL
    PID:1356
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1356 -s 540
      2⤵
      • Program crash
      PID:2964
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1356 -ip 1356
    1⤵
      PID:2800

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\~TM43EE.tmp

      Filesize

      36KB

      MD5

      20b1e8a0a01d08f531886751fff71562

      SHA1

      48647d08eb7b39ab7835cfa29833e914027c345d

      SHA256

      65866bf3c0107b335671d2510358ed60d3be328874d1abcb68a71be39e345cac

      SHA512

      1eecb57b74854eaf5b42c3a1ce3a21cb23b94f74588bee28a867e5fd9e3f77e34c0fad933a68c3db5bfd54ee3b45fddbbd28d0a9d9f01266f5e7e792f99b4a3a

    • memory/1356-0-0x0000000000400000-0x0000000000431000-memory.dmp

      Filesize

      196KB

    • memory/1356-7-0x00000000770D2000-0x00000000770D3000-memory.dmp

      Filesize

      4KB

    • memory/1356-6-0x00000000770D2000-0x00000000770D4000-memory.dmp

      Filesize

      8KB

    • memory/1356-3-0x0000000000600000-0x0000000000631000-memory.dmp

      Filesize

      196KB

    • memory/1356-2-0x0000000000400000-0x0000000000431000-memory.dmp

      Filesize

      196KB