Analysis Overview
SHA256
9b1a8d531e2e236b985adac7282d693ac8c5f8136bfa6071ff32821c9c3dc342
Threat Level: Known bad
The file e1e038644262e3d6878ebee04f0a6889 was found to be: Known bad.
Malicious Activity Summary
Ramnit
Executes dropped EXE
Loads dropped DLL
UPX packed file
Unsigned PE
Program crash
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2024-03-27 14:21
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-03-27 14:21
Reported
2024-03-27 14:23
Platform
win7-20240221-en
Max time kernel
25s
Max time network
128s
Command Line
Signatures
Ramnit
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\e1e038644262e3d6878ebee04f0a6889mgr.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\e1e038644262e3d6878ebee04f0a6889.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\e1e038644262e3d6878ebee04f0a6889.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\e1e038644262e3d6878ebee04f0a6889mgr.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\e1e038644262e3d6878ebee04f0a6889mgr.exe | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1888 wrote to memory of 3056 | N/A | C:\Users\Admin\AppData\Local\Temp\e1e038644262e3d6878ebee04f0a6889.exe | C:\Users\Admin\AppData\Local\Temp\e1e038644262e3d6878ebee04f0a6889mgr.exe |
| PID 1888 wrote to memory of 3056 | N/A | C:\Users\Admin\AppData\Local\Temp\e1e038644262e3d6878ebee04f0a6889.exe | C:\Users\Admin\AppData\Local\Temp\e1e038644262e3d6878ebee04f0a6889mgr.exe |
| PID 1888 wrote to memory of 3056 | N/A | C:\Users\Admin\AppData\Local\Temp\e1e038644262e3d6878ebee04f0a6889.exe | C:\Users\Admin\AppData\Local\Temp\e1e038644262e3d6878ebee04f0a6889mgr.exe |
| PID 1888 wrote to memory of 3056 | N/A | C:\Users\Admin\AppData\Local\Temp\e1e038644262e3d6878ebee04f0a6889.exe | C:\Users\Admin\AppData\Local\Temp\e1e038644262e3d6878ebee04f0a6889mgr.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\e1e038644262e3d6878ebee04f0a6889.exe
"C:\Users\Admin\AppData\Local\Temp\e1e038644262e3d6878ebee04f0a6889.exe"
C:\Users\Admin\AppData\Local\Temp\e1e038644262e3d6878ebee04f0a6889mgr.exe
C:\Users\Admin\AppData\Local\Temp\e1e038644262e3d6878ebee04f0a6889mgr.exe
Network
Files
memory/1888-0-0x0000000000400000-0x0000000000444000-memory.dmp
\Users\Admin\AppData\Local\Temp\e1e038644262e3d6878ebee04f0a6889mgr.exe
| MD5 | 32e2446e5ea8b44ee87ed1dec23ea040 |
| SHA1 | 1341be8ec8be902630fc92657b10016c5d83c14b |
| SHA256 | 1f261c1a1c5e7c051cbc0332db237c8e7335661251af2d950b05edd6d515f170 |
| SHA512 | 95b36862faec87482a2dd6aa16a2bbcfe73dcd30796d4d98db7ae6b46ec73c4f6de9880c7e8042697ffc5fddb296bd4610e69b0fb8275566c5cd3e85d9e693f6 |
memory/1888-9-0x0000000000400000-0x0000000000444000-memory.dmp
memory/3056-10-0x00000000002A0000-0x0000000000308000-memory.dmp
memory/3056-11-0x0000000000400000-0x0000000000468000-memory.dmp
\Users\Admin\AppData\Local\Temp\~TM67C8.tmp
| MD5 | d124f55b9393c976963407dff51ffa79 |
| SHA1 | 2c7bbedd79791bfb866898c85b504186db610b5d |
| SHA256 | ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef |
| SHA512 | 278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06 |
memory/3056-15-0x000000007797F000-0x0000000077981000-memory.dmp
\Users\Admin\AppData\Local\Temp\~TM6817.tmp
| MD5 | 9b98d47916ead4f69ef51b56b0c2323c |
| SHA1 | 290a80b4ded0efc0fd00816f373fcea81a521330 |
| SHA256 | 96e0ae104c9662d0d20fdf59844c2d18334e5847b6c4fc7f8ce4b3b87f39887b |
| SHA512 | 68b67021f228d8d71df4deb0b6388558b2f935a6aa466a12199cd37ada47ee588ea407b278d190d3a498b0ef3f5f1a2573a469b7ea5561ab2e7055c45565fe94 |
memory/3056-17-0x0000000077980000-0x0000000077981000-memory.dmp
memory/3056-20-0x0000000077980000-0x0000000077982000-memory.dmp
memory/3056-21-0x0000000077130000-0x0000000077240000-memory.dmp
memory/3056-22-0x0000000000400000-0x0000000000468000-memory.dmp
memory/3056-23-0x00000000002A0000-0x0000000000308000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-03-27 14:21
Reported
2024-03-27 14:23
Platform
win10v2004-20240226-en
Max time kernel
151s
Max time network
155s
Command Line
Signatures
Ramnit
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\e1e038644262e3d6878ebee04f0a6889mgr.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\e1e038644262e3d6878ebee04f0a6889mgr.exe | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\e1e038644262e3d6878ebee04f0a6889mgr.exe |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 3988 wrote to memory of 3456 | N/A | C:\Users\Admin\AppData\Local\Temp\e1e038644262e3d6878ebee04f0a6889.exe | C:\Users\Admin\AppData\Local\Temp\e1e038644262e3d6878ebee04f0a6889mgr.exe |
| PID 3988 wrote to memory of 3456 | N/A | C:\Users\Admin\AppData\Local\Temp\e1e038644262e3d6878ebee04f0a6889.exe | C:\Users\Admin\AppData\Local\Temp\e1e038644262e3d6878ebee04f0a6889mgr.exe |
| PID 3988 wrote to memory of 3456 | N/A | C:\Users\Admin\AppData\Local\Temp\e1e038644262e3d6878ebee04f0a6889.exe | C:\Users\Admin\AppData\Local\Temp\e1e038644262e3d6878ebee04f0a6889mgr.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\e1e038644262e3d6878ebee04f0a6889.exe
"C:\Users\Admin\AppData\Local\Temp\e1e038644262e3d6878ebee04f0a6889.exe"
C:\Users\Admin\AppData\Local\Temp\e1e038644262e3d6878ebee04f0a6889mgr.exe
C:\Users\Admin\AppData\Local\Temp\e1e038644262e3d6878ebee04f0a6889mgr.exe
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3456 -ip 3456
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3456 -s 10176
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3792 --field-trial-handle=2356,i,13261194862334667799,7441241219475888176,262144 --variations-seed-version /prefetch:8
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 138.32.126.40.in-addr.arpa | udp |
| GB | 142.250.178.10:443 | tcp | |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 9.228.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.200:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 202.178.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.150.49.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 41.110.16.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.156.103.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 200.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 209.205.72.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 103.169.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.86.106.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.134.221.88.in-addr.arpa | udp |
| US | 13.107.253.64:443 | tcp | |
| US | 8.8.8.8:53 | 100.5.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 114.110.16.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 119.110.54.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.178.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 64.134.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 36.56.20.217.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 205.178.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.135.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 205.47.74.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 42.56.20.217.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 174.178.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 201.201.50.20.in-addr.arpa | udp |
| GB | 96.17.178.174:80 | tcp |
Files
memory/3988-0-0x0000000000400000-0x0000000000444000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\e1e038644262e3d6878ebee04f0a6889mgr.exe
| MD5 | 32e2446e5ea8b44ee87ed1dec23ea040 |
| SHA1 | 1341be8ec8be902630fc92657b10016c5d83c14b |
| SHA256 | 1f261c1a1c5e7c051cbc0332db237c8e7335661251af2d950b05edd6d515f170 |
| SHA512 | 95b36862faec87482a2dd6aa16a2bbcfe73dcd30796d4d98db7ae6b46ec73c4f6de9880c7e8042697ffc5fddb296bd4610e69b0fb8275566c5cd3e85d9e693f6 |
memory/3988-5-0x0000000000400000-0x0000000000444000-memory.dmp
memory/3456-6-0x0000000002070000-0x00000000020D8000-memory.dmp
memory/3456-7-0x0000000000400000-0x0000000000468000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\~TME2EE.tmp
| MD5 | 4f3387277ccbd6d1f21ac5c07fe4ca68 |
| SHA1 | e16506f662dc92023bf82def1d621497c8ab5890 |
| SHA256 | 767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac |
| SHA512 | 9da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219 |
memory/3456-11-0x0000000077DE2000-0x0000000077DE4000-memory.dmp
memory/3456-12-0x0000000077DE2000-0x0000000077DE3000-memory.dmp
memory/3456-13-0x0000000077DE2000-0x0000000077DE4000-memory.dmp
memory/3456-15-0x0000000002070000-0x00000000020D8000-memory.dmp