Analysis

  • max time kernel
    142s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 11:58

General

  • Target

    cfsamdsfzrej_gr/LOL意哥破解版/lolyg.dll

  • Size

    369KB

  • MD5

    56c93154ca93d39732213aec4a808007

  • SHA1

    18b2ceb3655a3da841cc0610ac685bd34a777686

  • SHA256

    a25c8b9fb0b00a3a16394b40eea0d22ba6aaf9718c7d489e55c9e18d0dd459e0

  • SHA512

    86f963568a6831618144d158d63c5710ad81f0f18b5daea7de07020c06b5793909764919d289855dc720f3701a4e911116192d605086261bf1e94714fcaf1908

  • SSDEEP

    6144:B34tMU0GBeE8HmknK2h01GRny0zSGKO8MRWt816+pK:Z4t4/JHmd001GRn01BK13K

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 25 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 31 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\cfsamdsfzrej_gr\LOL意哥破解版\lolyg.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\cfsamdsfzrej_gr\LOL意哥破解版\lolyg.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2032
      • C:\Windows\SysWOW64\rundll32Srv.exe
        C:\Windows\SysWOW64\rundll32Srv.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2296
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1388
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2488
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2488 CREDAT:275457 /prefetch:2
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2600

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Microsoft\DesktopLayer.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b89f539a188ce92214abbbda29f712ad

    SHA1

    dfb655102185469287f26c0d4f5e6bc899bf6d65

    SHA256

    d51441d5b1b18b9a8245b8c2612bcdc6bcbdeae7bc7a520d7052e63e52841687

    SHA512

    2c4af0627f869c0a71aedc79a98c07ebe451270b6ba028d84437e657abc47317349b9de220ae75c97415824aa28ffbd919087f4f9b81c09698dac741feeb5c8f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4b38c62373ab460514969f802c5f6d55

    SHA1

    26dda0db7939d8d0932a69a7b202765b60dc0a7a

    SHA256

    63a3bf2b46cea3671422d9bd00785def5aa64db9c3bd7cc45b650c45ed9e88f0

    SHA512

    71080ebe8b09e1382751affb2a77f45838cd2c7b559024b49fc0e71f70f2f62aaebca29b888801699e19503b029dac6228364d5d9f0594f62f002801bff193e4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    53d3ecf72afb8b5855d1f3e3c0fed9ee

    SHA1

    3f0a10cd21550db123a8fae2a4e5abc7be2d15bf

    SHA256

    c3f19ed216f8cc97dddac5764c6eab6fb0448889bff9332ba56b3798df9df799

    SHA512

    c1f107c71020232ebe9864a53b050f227e9c603294ff4c0509c70d7a0df3149f54c0de8e108d4573eb98f3f343b40c6f74bc977d14de2335794f3e05e6231e9a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7f6da8b79b99939cab840dd595e89c73

    SHA1

    a19f0de2d74430cc4c7ff26a578d16126086e007

    SHA256

    41b14b4b1917a11b3a9562d2830d74786e8d9974cbf36b6f2b49aa8acfbf02c7

    SHA512

    b5752c6d0f756118502441b6adfaaa2a5f2000fbe26ee3065cfccc0ec85d0bbf7acc109b83e76e848f9e11eaba8ca20c5887eb6d9d6402834d60eb97144d4cd8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f1b874f0e69559ab095bc515ad3a477f

    SHA1

    055e6191ef9d33e147875ebda0789a233a5ae0f5

    SHA256

    a3f06c6e2c961bc10033c8bf82208035aa43a7bc3a432599075b97fc26f2eb86

    SHA512

    fae43deecdc307fc233cdb631c8bf500fbade45176775c21f212a253be2bc71d1af13b77306fdba882a081e49b3f423552887a75095cdd6557d1e2b35df674d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    78ebc184e89ea4cc91bd1cd3f00ec8d2

    SHA1

    b1fa96701720b6462e7d9682e4866e962e784976

    SHA256

    60bf5affe8cc36bd31ea84841817e64f287403e0db3a746f8b245ace94204ea7

    SHA512

    5b8fb3e22514e887467c96a0c0f583e322a6a0fe263e439b763c90def83420f1275bd66f610fd36fc996ecaf4c8d96d5742fe4bc57f88f496bd42231723f00be

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cb082a5eff7e81e1c01a3f2ece8c3476

    SHA1

    5e5a658260d6c1c85d31a5cbec899abe06b8170b

    SHA256

    634f43d90ad0e7278d63b7884bf3eb52f8a1f568e823c72ea20972f222c71e1f

    SHA512

    10009eacb546cdf7d88ca9d227fd76f0e585c2c1971d4e5743abd5c4d0d76253c228a83a3bb6e7fab26d9aabe7da74128e02e0b591c0717fa95b5562145fa40e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5bd07cbacf0b3926ce1d12de8713421b

    SHA1

    13bc058b497c3e5b8ee3733f19996fbd5f004374

    SHA256

    48990c7d5791f384fa54856cc3a96b4918b5b0e9b458f4dafcbeec8f90c27f63

    SHA512

    751ca7a42a1282503afb1f0ff18aaade1d510fff2840fd5a8b272a32cd6eb4539827ebe10129f734ebef30f1080f3a57d724d34aa46c078403e3671087fabe4c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6fd3f4fa3fd99a2e3c5539be7b87e292

    SHA1

    e1f9a25a2e4f9d7673c2b7be6e7584defa1fcf76

    SHA256

    88c86c74175460a871aadad48aa6b7b20780ef08b9c67da467a24fa16cbd5d04

    SHA512

    6fdf192fbdd99c40890efc57233227243a83d24578757bdd3d9e5b652f8851efb4a80fbd29bf27834f5de32979704a5a47283e915ba8d29eeb4de74cfef018f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    478cd97db5b60f3d5f9226297908a34b

    SHA1

    b8a091f55320ee9571a1ae9bfab9e9696ab82c9b

    SHA256

    a954b98b83d40d5a0bacc21432d641be9d4cf16085a3c5de67c8810beef490f1

    SHA512

    94cd6b234162bcb03bf4a7f27ca0729ffc36dd9da9694c4eeda1919fa5cabadf02f3471e3042850a09c1a83fef23beec2542781c26768fa379a458ceb296db0c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    08542d2785706585e591b56370e83bd3

    SHA1

    98304d4b6b7caf0ae272235a1941e76596c54d87

    SHA256

    2a48bd9a7233f13352bfe56c92caf2a2d00d7474ad617ca32d2feb18aed25147

    SHA512

    582d240a8d7e52e05c2916d18353bee4c402283deb40ec02f2dc456ccc4c66aa9e5a0ed92ef2b727b7a035044518724f6cd2c2b3d2028f697663539d41662463

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d481ee0ba3f422696c9edef7f9a695bc

    SHA1

    7941882d11a6baa54c178d1ae9a6c17310cd74df

    SHA256

    ffb6779f73425714d0e7d45f08d48efc39e6f7236f37cb33ab5f5e7bf665f386

    SHA512

    e80edcc53b27b411b0f6a1b25377a66f7f9b2b4eb9e3071e320bb8a4de613bb107a27a2c6232800a2cbdecd7f13d5d4ae93a879398ec2f8180764b1fe7f41260

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    92ff336365fd9275fb1d5bf7d9650cbf

    SHA1

    486cca746b46579a2c3ee136dca842cb6fd9d949

    SHA256

    a3d42f715f6352d201770a0fb336a91af005fd06b41ca1f80abdc8e230482813

    SHA512

    6aa3286515fc5e18fe80495b6a9723e236f29482fc768fe5a1223ed24ff81eaed9ad72da20862274b233687c3eb6fef160779ca1e5951900d13a4970cbfb961b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5e0cf4554fe4fca7f8ebe7c047f4d913

    SHA1

    3be92731e5dcb3656e1c683aed534ab9feec9be9

    SHA256

    b4c131c95621e93c7c3efb7a280d9892c86c258f3b1e556d0a18e2cfa06fd516

    SHA512

    0143a222b82fe7b274cbd3c214c06a276958d0cb3b683c63a98f64c3d0da0ad657fefd38bbe8746cfe9110060690acf79522ee14e14e695aed250decec6947fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    74ba634267db0ba4b007236e870a7531

    SHA1

    fb8c79fb08d73ba47e60978b4a83c4d279641daa

    SHA256

    be9e248b565025a3bbc0ea8cd4dd929271110bb2407ecf27d6625ff4c8e9429f

    SHA512

    d776acc9719aa5278ae1b630ed09df963b9d96297b0bd98f806af9f5d0f3bf6c9f42a4fdb146891ce68c58a248b5954f20cbacf18335320c7c27a86998197e6c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f7107a7a74d72e2e53f9c1fe3b234883

    SHA1

    54c75d1a0f23539826bc80735f0e123f1d3d5311

    SHA256

    06d66b0b87ac12e34903e2d40296d5255016bb99f8893bfb23fac030d4ca987b

    SHA512

    a2572af0649588c4a0818972211c51a07eeb31394256d8c90bbea4a1f77270da3194a5e90e0f8debf290357ac8d0b33eb6782b080f30badfa2ac1333d024a4ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    01720787f297daab551690bd5daead4f

    SHA1

    4663d15be1aa75c74fe34f1783fc0cca39a34d7e

    SHA256

    0e8d19ca03209ba89a78325d5474a042db1a46a729e2ed687dff5f9ac3da36f1

    SHA512

    a0deea34b1d571a02e3b2690ac9e93e15fdb2f4523bf731ab0ccd71f5acb850b6179b726c4fdae8b7cb825bc9d080058d71089f5ea5f2fdbe533003f143711c6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7dcd014cd4ced4ffb54227a4a791d3f9

    SHA1

    04bbb8dc1fc7253e6ae000d84ef81ac199b701d8

    SHA256

    df975209360acafeed9321377bc097ef3a723a5947b6c63f1fe29e229477212c

    SHA512

    12102e9f0c7a80e19db089ff87a8d6d9ab5bdfe6a5bf050b779234f851912292057929c20889c6f705531c2b99c26eff5e4ad341056d8ffa90ee532986186eaa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    98d247fffdfb528f5ad8a747b2c0c835

    SHA1

    f955b5019d84b496ff15413769399a5013a2088e

    SHA256

    cd8ba6d81b71e054f3b78db6844ceded60e4f5d70cf495215c3dc93200e39066

    SHA512

    fb303cae79a836bc9e28a2b804603a69b92e5adcb72478d4165af9f5c22b35ec27db9fedfd7cab8b2bdaf3eb6865ea1b0a292a65bd3002e9f8e02374a73b4788

  • C:\Users\Admin\AppData\Local\Temp\Cab9915.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar9A67.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • memory/1388-22-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1388-21-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1388-20-0x00000000003C0000-0x00000000003C1000-memory.dmp

    Filesize

    4KB

  • memory/1388-19-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2032-506-0x0000000010000000-0x00000000100FC000-memory.dmp

    Filesize

    1008KB

  • memory/2032-2-0x0000000010000000-0x00000000100FC000-memory.dmp

    Filesize

    1008KB

  • memory/2032-504-0x0000000010000000-0x00000000100FC000-memory.dmp

    Filesize

    1008KB

  • memory/2032-505-0x0000000010000000-0x00000000100FC000-memory.dmp

    Filesize

    1008KB

  • memory/2032-502-0x0000000010000000-0x00000000100FC000-memory.dmp

    Filesize

    1008KB

  • memory/2032-994-0x0000000010000000-0x00000000100FC000-memory.dmp

    Filesize

    1008KB

  • memory/2032-501-0x0000000010000000-0x00000000100FC000-memory.dmp

    Filesize

    1008KB

  • memory/2032-500-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2032-993-0x0000000010000000-0x00000000100FC000-memory.dmp

    Filesize

    1008KB

  • memory/2032-992-0x0000000010000000-0x00000000100FC000-memory.dmp

    Filesize

    1008KB

  • memory/2032-4-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2032-503-0x0000000010000000-0x00000000100FC000-memory.dmp

    Filesize

    1008KB

  • memory/2032-237-0x0000000010000000-0x00000000100FC000-memory.dmp

    Filesize

    1008KB

  • memory/2032-0-0x0000000010000000-0x00000000100FC000-memory.dmp

    Filesize

    1008KB

  • memory/2032-24-0x0000000010000000-0x00000000100FC000-memory.dmp

    Filesize

    1008KB

  • memory/2032-987-0x0000000010000000-0x00000000100FC000-memory.dmp

    Filesize

    1008KB

  • memory/2032-988-0x0000000010000000-0x00000000100FC000-memory.dmp

    Filesize

    1008KB

  • memory/2032-989-0x0000000010000000-0x00000000100FC000-memory.dmp

    Filesize

    1008KB

  • memory/2032-990-0x0000000010000000-0x00000000100FC000-memory.dmp

    Filesize

    1008KB

  • memory/2032-991-0x0000000010000000-0x00000000100FC000-memory.dmp

    Filesize

    1008KB

  • memory/2296-8-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2296-10-0x0000000000230000-0x000000000023F000-memory.dmp

    Filesize

    60KB

  • memory/2296-12-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB