Analysis

  • max time kernel
    141s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 18:19

General

  • Target

    c0cfa5a0ca9559d148359725cadb599a2138715bd8aa6056f4c6214458f11c6e.exe

  • Size

    1.3MB

  • MD5

    531a42f1252ff1b533ac9353cf2efba8

  • SHA1

    d8c2089b31bf5d254d15d6cdc87b0433f8da1d39

  • SHA256

    c0cfa5a0ca9559d148359725cadb599a2138715bd8aa6056f4c6214458f11c6e

  • SHA512

    1ba00aa9af501e9142cc05d67c9f7c3ccb70145cf0266609a5b60a76f8dbfba6a58214fc314107b0783a363bd9a5fc00a5ab49fc7caf34e24ea110dc661ded34

  • SSDEEP

    24576:Dc3Ct5gIRjgUM8NSz+OY8KoQ2SnpEQKQoMC5FzamgaTsv7ecCald9z94GWGkAVyr:Dc3E4sIuIxMaQKQluFFTQqcDldLqGkH

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 24 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0cfa5a0ca9559d148359725cadb599a2138715bd8aa6056f4c6214458f11c6e.exe
    "C:\Users\Admin\AppData\Local\Temp\c0cfa5a0ca9559d148359725cadb599a2138715bd8aa6056f4c6214458f11c6e.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Users\Admin\AppData\Local\Temp\c0cfa5a0ca9559d148359725cadb599a2138715bd8aa6056f4c6214458f11c6eSrv.exe
      C:\Users\Admin\AppData\Local\Temp\c0cfa5a0ca9559d148359725cadb599a2138715bd8aa6056f4c6214458f11c6eSrv.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:2816
      • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
        "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2940
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2572
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2572 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2740

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    8aa5fa1aaea6d715f5e3bf46df81a111

    SHA1

    b6b1c5d6127aebd6b548f58cbda17da767d2fc2e

    SHA256

    e2cdee29cf134439532da53fba15d9bfa2211ff9dc4ff2cd211f21f663e2078a

    SHA512

    fa1ec9dcf7186461f1f9a64b29b29298108beb41d1ba6032080cf917c5c723907a825daa416321dfcd7f82841025fda12c7be1c1bf40d0007a3396824dd490f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    592e94517f7dcfae44f76350580f791e

    SHA1

    4d6df25e4a96db5c3b24744e4625ae6a16738fae

    SHA256

    8707b503c28ccad878720d3d23f5e457d9c72e849655c45e4ee3b7a13a51d8d5

    SHA512

    113a8b60f8140985df04e97183e13e6fec1444a7d854fe2779c30917bf6d4fcb8b988f41acbf2ae6a29d04129dc54a4c1df3ba674cbba325277767777af13131

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    c12b5e0e1cb967bec7b93e9cd2814341

    SHA1

    b75d1a480507ca802ff7c95522393d5e0ea80566

    SHA256

    08b252548c414f49d020c6eabb0e86fb0091a6d139e7e9666c0eeb81f092a84e

    SHA512

    8e10cf7b54709976f8c7c1ef09e9cae8afcf1553d446b25e8e27ec8a9aacae437ee3fc369c0d716b4227a777a92edbdf3e75e61269124429e1e2bdbc91998a14

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    f7c32fac80a54f158a12c51091e74ecc

    SHA1

    5f30b493090236d19d51f8b15994a2aeaf84ea2f

    SHA256

    3c46ccfb13de0fa0417a164e139a8cfddd064640712deca2fe68eb349fc7e9db

    SHA512

    dc313b2a63fdd93a184accfc776fcdb8c5a03c32e714433e4ee78391f721afb16d8badb8307df811cbf8dd651e0952b2e7e7b9c5f2857a0701774dd432143371

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    98047f570b0e62e8863403039eca9a5c

    SHA1

    d441c66c244ec06d9c384a8014db1222721609be

    SHA256

    b90ae927b20b45ba76201dc04f10f9eca8afc7bb3bbacecb87fc14b9e06e535c

    SHA512

    dbe27a8678ce2870f1c890b3f8f2c02aa168019d18099ac3d273ffb55bfe99aac9053535f99f742f259784bc08ebec1b172bfdb7f24c6e0a1c833773655d47ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    94efeb3d3d03fe672cb6b60e3fec3c79

    SHA1

    4b6bc5412c6eb38dbf47e2510273b5b08982cfcc

    SHA256

    72eb6f5836598ba092c32a6fbf76fac6d8b4be05ff6e35d9edcbcfa70a2964f7

    SHA512

    544184df4f428ce5c7315b08a6606b1da5ddd5d80303d2181a25f5bf4c5e2a7b60ebb59dcc86e9e2bfb1968d3281250ee4847d2250e0ba7a8ef65b967ef8d0ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    aa3c2189b98c0c2d51520714620e1493

    SHA1

    d7dd67447cf41d5e4099be022d842d419854d2a7

    SHA256

    1070e872a0de707e05671c6c0bf99d447c719b3c0639129841dd7045f8653618

    SHA512

    fa36f2c27a05c11933fe5bc37db38371e3b7d1dc3da3860f2c444f94f3b3158964e006bd8bd73bd665174a58064c5626c790e9f2c3ddc3071a9c5f792e668388

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    c9b255ed06e5fd46fedd1a9616907531

    SHA1

    423507f8e6a557ca04b3bc0465e8ce23b46e7b99

    SHA256

    fc26445e71a883e7fa752f1fb1ce53c3f3e45837be40ce3d3cd81a80002c146c

    SHA512

    1ea9eef805f0c784be218eb77f1fc20190a120527deb6f3bc5fadd73d593e09ca0997643a2ad4a427349d94751f33dc8a8c0e40a40d317b6b0ef774ad4da9e7a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    2a0b12db549209e1652c40f9914e4c74

    SHA1

    bedfc58f76182fcb23e75a9cb92073a81344ca34

    SHA256

    d27f4377646f378719b8e88669f44e4f6b438ba3f50616d9d4dba1b3f830f91d

    SHA512

    088d4394e16d7030ba299b71587adf6b5b2de8f0127be7e5977e9d046b81f3bf3cd18eb6b080d5f5df37dfd420f528b8639e1a0feb7b9fefd6167de00b5396fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    27879b70668117d58c9f2ffe1456281e

    SHA1

    fc730dcee2038c84da44a11d27c6ca704fcb88c0

    SHA256

    27cf683d4eaf2f8bfbeaa2d81610c53c5f5088a53ec61dd2b538acf3194ee069

    SHA512

    7a4786e3855890691c407b393d86de0dbacc1976cd8f87d038db78d51ba18d89ce737402150619a634b102d1f077d65c953787606519d5a1032295b4f578e86f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    af4a00c83024b0a254fe4967eeca1f4d

    SHA1

    8dbd874577cc68cdf7c715c5cb22257cec0208b2

    SHA256

    a012c550181cf4d918570ed1cfbea7271472daaa7dd79b16ef85df641b9cf06e

    SHA512

    e71ef2fee05605d84bbb1abead200b91a6c317223954042326b5272dc8e97fbd0dc06a2ef1fc796c69df46f322c612a02513751e43333dbb4da351a97b2bba91

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    ccb1f96d4c3ff8a0ff50d64de94c99d0

    SHA1

    9c3417f303d4aabbcc012085bc17334b3614fc8d

    SHA256

    2b1a927a8d636ce7a92753b6bbf3bd3bac8d986c07970389bac6f44d2edfb65b

    SHA512

    cb2e00b69f4f022ddb3f68a5705fafbd80582f8bc256534edf80f869c4264c891ca7d596add08b6a3c43d0ee23843b4ffcf039af65c4e44f929a252e2a03a05f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    6f7737e996c51d586651214709b1807d

    SHA1

    f3f7aa09d1eb263fb2ae25b994be032b0735285e

    SHA256

    d96d978a1968600c7a16352bdd18f892ed96849cd1dbc204ecc318e04db99866

    SHA512

    ecee3fbd7c65763317eee45b92f294ea0349e22f752e3ec64a0af6b3f67bd5357f9292155191d3b7bb5bcf4b24323b1f79388f07f5ae18e5418e445dd1b4bc0e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    2fb567a38b123dccf74011cd1ebbc64b

    SHA1

    31d6a95386cc9fa077d0e5addde811b6c17ed567

    SHA256

    1459e7570df12e51de78f4c4f870eb6e70d42d71a6f87f0e61fc54388cc7a8c6

    SHA512

    d43ae356917354d5ddb87734fdae1d0e55212b3dec72375ce52eca0e293d62d2ab61c1fca440cdfc72bb3c86c427e253a80d7bcf66b842f61f72b7941adc9d20

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    632cd52cf71a66772f544a16d94ea557

    SHA1

    f1750a82ef49bf18a5bcaf7b1a191141a503eb43

    SHA256

    907e62495fbc2773eccd6a9264438094b925e3555261896b95e772628028eef4

    SHA512

    b3455f61b66762d7c0eade88ff13afe9a91a761cd487045a61484b1ce286304d2da2f581219da43c91d553e86e7841bc4af28048efd65a5b3c43f9d45a19ccdb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    7825472c502fc8ff03c575ce11f3fdf6

    SHA1

    a88123308cc81c423ffd8a45e44d0d52aeb61b7c

    SHA256

    5423602811956f7337b43401b17a1071c4cae073709475f5dabfacf9fd8a885e

    SHA512

    6e8237174e3f2f67167d479e6eec7866dc44d0648b01dff70ec36b1672ea189f76b11ba71b4795b9e2bc6777bcb9d14b3a7cf095030c977d9a54f121c0118de1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    069dbdd3488efd00bb2d94bdb69a3964

    SHA1

    091147aa97ee37f71b52a48e5736a463efa5d7db

    SHA256

    4d57b126e1d664434a3e716e5747331a39eafd4bdf1ad83b11edda3eed021cd8

    SHA512

    c36a4553b3e01083e53c87e3e8df19c39e64ccdcdb088dfe87f4bfe3f901d7962b5ca4fe92b81ebfeccc1eeb9227c554551d8b976804f31dcecefb0b1186486c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    e2f743383bdeb81197a65293c8f87c4c

    SHA1

    a7e3db6a53f5a233a192ecda1e11bfff1d33a4d2

    SHA256

    cc3d295b9f088f5c06a87074c9fb1043fdbe043f5f9ea7515d25c368db6c1116

    SHA512

    7ecda4519fc071278ab0fa459efcf8b656cddd6d424b45c6f12e494ea1878b1034e85bc80bc7292b3c814fb44362b97279e6325d7e0ab6995c286d53c6c6913d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    f0fb297d54e0764516320b88989d327b

    SHA1

    8f5520fe33c2ad652bffcfdb87ba86bf59c9c281

    SHA256

    077b1fdd73b5413243af72d9db303cbe3e06d8906dfa2617ff47852743d3a369

    SHA512

    d2e2f048b2e42efd8343e1b8406a83fb4fcff9693b96820502f2626a5878ec8a37e492663695f925dba5cf4324c5e0e4b69c642221a16184c0869eafc736cd5d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    70a6b16b06fb88b6e8b7f2de9472ad6e

    SHA1

    d7456bcc2868878103a3653bf133b99e7886f02b

    SHA256

    6b33d079dacbbe339e2c5b10aa4cd08d4717e13a0503e36abc02a15d7fe3ee0b

    SHA512

    35dc3241c0da580a6a05e2419b914c6a0db1ac65130e8512d8c6442c4c0825d3a393da386ead5f4b8a5490a0eaa43288f7f7b0ece08a1521090b45234d7caa8f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    1f05cc429a6031503760202f83c49c4a

    SHA1

    983be4d540ab5539ce8975f78b4690923f139a54

    SHA256

    80e54a46f773ff585396cdd4ea16c5a307d1bfa73429fe116989eb2c4a9a0dc5

    SHA512

    0b23b715f9a8006e643f10ba33ad231ce60344554c6b491e5e5c16cba47a225c393c2107359c19b88793d6285547dd8b52a49151628d3cc5da7d904bca3e55d6

  • C:\Users\Admin\AppData\Local\Temp\Cab34C9.tmp
    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Config_Proxy.ini
    Filesize

    761B

    MD5

    276f6ccbf64b363b905347ff284315ec

    SHA1

    564e19436bfbc8f98c01394ca649e2c2fd684106

    SHA256

    28d3eda0d8429aff3672dc739b577d22eeddf4b92f1aa8ee23c56bcd127f2665

    SHA512

    464feb90d0200541607c8db525e6bff3e170fef631509fc33f377ba0f0acbd7fec0285e4847abb4cc54cb87bdfb39afea35e07f06d515b1804daf3984db76b36

  • C:\Users\Admin\AppData\Local\Temp\Tar44D3.tmp
    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Local\Temp\c0cfa5a0ca9559d148359725cadb599a2138715bd8aa6056f4c6214458f11c6eSrv.exe
    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/1736-21-0x0000000010000000-0x0000000010041000-memory.dmp
    Filesize

    260KB

  • memory/1736-489-0x0000000000400000-0x000000000074B000-memory.dmp
    Filesize

    3.3MB

  • memory/1736-74-0x0000000000400000-0x000000000074B000-memory.dmp
    Filesize

    3.3MB

  • memory/1736-491-0x0000000000400000-0x000000000074B000-memory.dmp
    Filesize

    3.3MB

  • memory/1736-492-0x0000000000400000-0x000000000074B000-memory.dmp
    Filesize

    3.3MB

  • memory/1736-493-0x0000000000400000-0x000000000074B000-memory.dmp
    Filesize

    3.3MB

  • memory/1736-495-0x0000000000400000-0x000000000074B000-memory.dmp
    Filesize

    3.3MB

  • memory/1736-496-0x0000000000400000-0x000000000074B000-memory.dmp
    Filesize

    3.3MB

  • memory/1736-497-0x0000000000400000-0x000000000074B000-memory.dmp
    Filesize

    3.3MB

  • memory/1736-498-0x0000000000400000-0x000000000074B000-memory.dmp
    Filesize

    3.3MB

  • memory/1736-32-0x00000000001E0000-0x00000000001E1000-memory.dmp
    Filesize

    4KB

  • memory/1736-51-0x0000000000400000-0x000000000074B000-memory.dmp
    Filesize

    3.3MB

  • memory/1736-50-0x0000000000400000-0x000000000074B000-memory.dmp
    Filesize

    3.3MB

  • memory/1736-31-0x00000000025C0000-0x000000000262C000-memory.dmp
    Filesize

    432KB

  • memory/1736-938-0x0000000000400000-0x000000000074B000-memory.dmp
    Filesize

    3.3MB

  • memory/1736-490-0x00000000001E0000-0x000000000020E000-memory.dmp
    Filesize

    184KB

  • memory/1736-937-0x0000000000400000-0x000000000074B000-memory.dmp
    Filesize

    3.3MB

  • memory/1736-4-0x0000000000400000-0x000000000074B000-memory.dmp
    Filesize

    3.3MB

  • memory/1736-936-0x0000000000400000-0x000000000074B000-memory.dmp
    Filesize

    3.3MB

  • memory/1736-5-0x00000000001E0000-0x000000000020E000-memory.dmp
    Filesize

    184KB

  • memory/1736-935-0x0000000000400000-0x000000000074B000-memory.dmp
    Filesize

    3.3MB

  • memory/1736-934-0x0000000000400000-0x000000000074B000-memory.dmp
    Filesize

    3.3MB

  • memory/1736-931-0x0000000000400000-0x000000000074B000-memory.dmp
    Filesize

    3.3MB

  • memory/1736-932-0x0000000000400000-0x000000000074B000-memory.dmp
    Filesize

    3.3MB

  • memory/1736-933-0x0000000000400000-0x000000000074B000-memory.dmp
    Filesize

    3.3MB

  • memory/2816-10-0x0000000000230000-0x000000000023F000-memory.dmp
    Filesize

    60KB

  • memory/2816-9-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/2816-13-0x0000000000270000-0x000000000029E000-memory.dmp
    Filesize

    184KB

  • memory/2940-18-0x0000000000240000-0x0000000000241000-memory.dmp
    Filesize

    4KB

  • memory/2940-19-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB