Analysis

  • max time kernel
    141s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 03:57

General

  • Target

    0da24e9a4fe58ac5beb38be8ccea52fd.exe

  • Size

    149KB

  • MD5

    0da24e9a4fe58ac5beb38be8ccea52fd

  • SHA1

    a6d12e8ad8e3eead695c490913d845f5e586df68

  • SHA256

    15bdce9489d2c74c5c88a5a8f0140e60982c038c8169977a1a2c1f0aebab50b9

  • SHA512

    8dcdcfcf1b13dcf11bed9dc0040fb832df7f4c154a34a4f88e0ee38c1c38ba7c357397c711797644ea9bd525d081987521d1cf001b96a96026845c87442c7237

  • SSDEEP

    3072:RROzoTq0+RO7IwnYZnSDADeak7dJHB/A9ouUljtQnjPtwi3gSO8EeL:fkdNwBGnSsQLH5A6uzPtw/j

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0da24e9a4fe58ac5beb38be8ccea52fd.exe
    "C:\Users\Admin\AppData\Local\Temp\0da24e9a4fe58ac5beb38be8ccea52fd.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2332
    • C:\Users\Admin\AppData\Local\Temp\0da24e9a4fe58ac5beb38be8ccea52fdSrv.exe
      C:\Users\Admin\AppData\Local\Temp\0da24e9a4fe58ac5beb38be8ccea52fdSrv.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:2720
      • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
        "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2680
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2736
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2736 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2704
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 120
      2⤵
      • Program crash
      PID:2412

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    062c87fb082eb83dec6289c6c0b51bc9

    SHA1

    e9c190b2302155feb00564cd337bb5e7bce9a5a5

    SHA256

    89208d5ebd216e03c3908feac4e3c802e8aef4d0d7587e20c1b259f805810ad7

    SHA512

    20c1f2fbeff09695149a08e3b228303dea824c2b0d548b81aee1ac74d95a2a1eba0fdec724930a899e577c0800d6367b18b301cf826787c9a16905c49495bbf1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5ab281d699cff3f5fd95d6805911a750

    SHA1

    f667ec2983c4e7cbe0812b37bcac46b21147438c

    SHA256

    68d0da80a578abd2f0d334cf559c30855acd98686875f445a2fc678faf8f94ab

    SHA512

    5994acfd5c386c0701f48e07283f3ecb9743e47a2f33b2f7e86330c69ac1480723847e453e8e731f985c000bef44509ebf351195480ef44e62b9f7a0adc79655

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0c5f25747fb069c8c31b1e74d9a5a791

    SHA1

    ba4fe71d12830b9c3c555c8e12fa6d27a0cc64d2

    SHA256

    e06426167ef61ea89a8402279f7cf8506c936ddc303e519e5f3b370ea9c7433b

    SHA512

    2eef87c2f96ea5a927d695b751c77b653b3a1fcd5790fec0e48ee3d36aecdc74ae6556b5299ade624f8030d3bdf9681ee4c11cf3a328c9e1dfccc8f5702ce37f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6bea01e5ee82902e5021438bcb9d60f3

    SHA1

    d217c87a3a9b7c4ae3cbfb79bf7adfda9a0a419c

    SHA256

    d3ab2742568d4a134ce50307eeffe4b9926b334378abfa253765475d922f4168

    SHA512

    7a5e73030b2e51828610d0932ac97ce1baf734b03fee680ad512be22209bc618b2cda321aa23db89de6ea38b85445c9a061fb7a201602d9dc46ee8dddf85efb2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    22ebba38c9272169b53776d860ca869a

    SHA1

    170f3ca4db711d264dafd8c022afd572e7780de3

    SHA256

    3a5bfa604520927c64504128b38e7db6493fa56a70497fe7809ccd30d0b8f0f1

    SHA512

    cdd0d67c306ec9b6ab1b5b09fc73aba780e6c1b85186a63726f8978c5145b25423ae80e3be7b985429e06d40e32383ea9423f87a5452a3a1633eed0acd4023ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c9fe4462e70023ce305cda78fb657457

    SHA1

    1359b29560a71ed9553d253eaa5b4104138dfd67

    SHA256

    2912c5e555f358742494a175a73fafdb4f5d10d19996be3a0ce5e1441c65e1f3

    SHA512

    dd69c5f11b5dd9cf41ff580668f7b6b8a5b18a02f490366339d2f98b493013f033d7c791a70e58ef2aea2c4d964b8466326b4aefd4076562e24ddb197408d105

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    84075956034cee2c4443d85368302dbb

    SHA1

    fc46de5edd8b9f264ed388a584dbc8743041b94c

    SHA256

    937eadc9ef2b5717b1b16e1ae2733350febb343c8699ef02f1d8388c8be0df9c

    SHA512

    bda5351415d0947b7908e36469b6c6f4a8bc479e6c0ecc96ce4a8036cafe2e21e16d1737d08626253af992bcdd0fe85be49df0622a83b08c5e2d3a914832c567

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    78855c288df90d215007f5c02e580a9b

    SHA1

    c2c72f890f574ec544e829f999a918c46328158d

    SHA256

    3513b5dacc8d59991620f386ee18f74a5d095ed5406d7ec2d5d00c8f077a9e9f

    SHA512

    8122a17a3f2e27385a099fa8544b94ee78347b533b88cfbbd7a9e1a003a21ef1ee6d72608f7ddc2992783606e3ea3a35cc3b166b5f8ae661e575762443138fba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    558dd6f1a620f9c2725e124f56578bd4

    SHA1

    cd179ac63f05a8aeb305fcf6c4387587d4bd3d39

    SHA256

    5a9098f9eec5a8eca4808ef630934ccc868abf70a06f454576919ee0b16a6e23

    SHA512

    c29b72e07d31411d884af141e719d1d44b3c487f44d7dabde5e97af6127000f8d75a6c5265ae66786791b629a0a7695c7353fbe3030f231f88df4dcb9512bb3a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ceef7b3a56840292904b0c0ce2bd4e4a

    SHA1

    fc51d7c025b0bc96f0c70e9393c1006195d5386d

    SHA256

    0125e0242724b0d2366151ce4db9def7c61816b593d7192cdff9f6e8e4d16001

    SHA512

    e88cfcf6466eb723b97f2c216f8e2e9a1d5007f5970f6946767bdf365626a8c59be0103c2c7b06a427b6681278def0894f8c98e96b3a8e4b62c8af8e3275b1c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c08416eb71bcc4ad3c3e4b3d4046eaf1

    SHA1

    d50fbd8c3728436c1c579677eb8ff66ef3d40603

    SHA256

    76ff376ccf73b5f9ddd824330630a444b3a627a78e8b34d0c1beab10f6890ee0

    SHA512

    6d611269e89863576fabb0d9169194b52afddc179caebd21538b35bcab673f661103651cc0947928413dc7ee6bec87613266bc7076b0280f7247b6d096b24e69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ab15e7d287ac0d70bd5a5e032144db80

    SHA1

    8bf98aa5412c0c0d35371f0fa019a3248c1fc3c8

    SHA256

    b3b1cefdb032d1d60a0828cd8b73c3783ee67446627598f1a84d903ddd7df5a6

    SHA512

    32321800c2728f6d0d3fcb40ddbb421d188ad7adfe35c4e16986792a76165b6b6ca8c2a03325ef61682e9d7354c5c06e3cf82a6df2e809ef069736fb5f09b537

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b0dc3dd7a7438a614c7bdc824008d12f

    SHA1

    17373e68fd1c17f6b06a2183f159702ede8679d4

    SHA256

    ac8c2c1e4f50b67765633ca869541b41891a60af10b0239ecabd3ccdfa80817d

    SHA512

    94ef5077916dc27593a563ad8484e54f70cb15b58518d9818b55ec159062f679156302742dcbf77e1bea87c8833bd7c479d7e7d955cb5c4115b5ebe590cfff79

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ec892dcfa94ee6fdcb0904917c919478

    SHA1

    d479dbb0b33384c9b6b21586672c7fd6ea43c548

    SHA256

    bc92b70f7c8524336ac362c03a8b619bd4b87334c8b2a1d560e9915620b75618

    SHA512

    a0499aeb965ee88c8b283540cc3a90d4370a7f19e48e2f22984c8e3788c4ddee4670718a56b124047c9ca57e2a9afb111dd449fe07c8ee8543d01dd31876d350

  • C:\Users\Admin\AppData\Local\Temp\Cab8F26.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar9015.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • \Users\Admin\AppData\Local\Temp\0da24e9a4fe58ac5beb38be8ccea52fdSrv.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/2332-100-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/2332-5-0x0000000000240000-0x000000000026E000-memory.dmp

    Filesize

    184KB

  • memory/2332-1-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/2680-20-0x00000000001C0000-0x00000000001CF000-memory.dmp

    Filesize

    60KB

  • memory/2680-19-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/2680-17-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2680-22-0x000000007774F000-0x0000000077750000-memory.dmp

    Filesize

    4KB

  • memory/2680-21-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2720-7-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2720-11-0x0000000000230000-0x000000000023F000-memory.dmp

    Filesize

    60KB

  • memory/2720-10-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB