Analysis

  • max time kernel
    133s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 09:26

General

  • Target

    30d9a187b7eb9f518d103b2a34fd67dd704100fbf8cee830e49f7320aa539574.html

  • Size

    367KB

  • MD5

    6d7b91252cabc6c5c9e66efb7d3ba05a

  • SHA1

    1dc935043edd2999aa3f531049d3d9b325da16d0

  • SHA256

    30d9a187b7eb9f518d103b2a34fd67dd704100fbf8cee830e49f7320aa539574

  • SHA512

    d7e6509581911f1e91f86e41833cd283872287879ab398e0332ca9e9ea1d96a747b4676e1a6040f43150a7a4faa6d86bc31230742761c79f3573f6926ba2c7b2

  • SSDEEP

    6144:psMYod+X3oI+YgLVsMYod+X3oI+YbsMYod+X3oI+YQ:15d+X345d+X3p5d+X3+

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 7 IoCs
  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\30d9a187b7eb9f518d103b2a34fd67dd704100fbf8cee830e49f7320aa539574.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1876
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1876 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2096
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2944
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2100
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2724
        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
          3⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2704
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            4⤵
              PID:2604
          • C:\Users\Admin\AppData\Local\Temp\svchost.exe
            "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
            3⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2548
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              4⤵
                PID:2660
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1876 CREDAT:275463 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2500
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1876 CREDAT:275472 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2484

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          Filesize

          55KB

          MD5

          42bacbdf56184c2fa5fe6770857e2c2d

          SHA1

          521a63ee9ce2f615eda692c382b16fc1b1d57cac

          SHA256

          d1a57e19ddb9892e423248cc8ff0c4b1211d22e1ccad6111fcac218290f246f0

          SHA512

          0ab916dd15278e51bccfd2ccedd80d942b0bddb9544cec3f73120780d4f7234ff7456530e1465caf3846616821d1b385b6ae58a5dff9ffe4d622902c24fd4b71

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          cad438673980fb01751f5d64338edeaf

          SHA1

          3b700792be1a5999fb5c6d318d9832b2397a0156

          SHA256

          7ca41ed086a087f4f043f79ae6868f99c0c20bc0c193b5252d6f73263b7b223f

          SHA512

          57a01786df8de3d072982a80a24554c28930dfe748fa48d063ce84201d38d0ae8a92f412514c66a84421eb6d97cdb33a2640ef4f9501fe1ff98444c15b1fee4f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          2128a5877a53f6077d5848d685e9724e

          SHA1

          09d2e53b81765e1ff847ad1131fa459c5219b2b8

          SHA256

          8ebc7a43f33e8d4508d08762fe752a7246cc4b6f88b7a80f48b5cbb9dac026ca

          SHA512

          e7fdd8f103749c2f280f3d6ed51bd6120cc9cee7324a07507a171662a1e69d6efaf4845fcee441a4218155e97262e4cfc0923128db3b29a75184df7903475a42

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          05db145bc5310017029bdb7b072b7f55

          SHA1

          f1a6b52dfe3746efca142879d999672cd6b9fa66

          SHA256

          83f3b41d3237b8ac1393ae972f26f5301ffda19bf2f0ffe503a4e2234bfabf4a

          SHA512

          7a78acbcb43dcd6ce9a78a91b198cee5ca41d375156c34bb91105d2e234da33fc563fd33d2970a1f57ad69e51eef305e4712d35f2299f73313d48b4af08731b2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          b9b52af5f6b30623cad0a30880fe9b30

          SHA1

          7510cb9f106be6ec5e874d201e91068d0fab6f9b

          SHA256

          a0ad74c12d3a9914fc852016538b1247810c65bccd6d281ffea4cf33bd0a1333

          SHA512

          33479f16ec65b78cccb266cc740e8dafc7adcbfd396d83c94f5287b181ad12d9e208d8a9f5dc10add6b2febe0448f9e35e1135e0989c5eaafe1df1f362504636

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          dbf37b07d17b6bbe6659fc4be828cd93

          SHA1

          fc8cabe807b0a6ac6870c8e406e2efba25e07205

          SHA256

          7f000552cca3e62138ff2ac307e0e6004e6b550a52f90b88739bc36672b438e6

          SHA512

          4289a0c813edcaa307ac45836757a59693af2d27cc5605a2d465f4d8be71fc756457faa9e76db69fbcee3d940c3a468ec6de94eb1f7b14c98ebf7eb7be1505a4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          6f02a601083a6b2edb5ce5bd354797b1

          SHA1

          e854f99234110bf8959923b72f82f2d0cc07ebd0

          SHA256

          68a62cfd288f5396314f16c8645351496b458be94665c40d21aae1e3d43394f8

          SHA512

          3c5f8eb4d4610657f6a54032b9cb5b6740abe88131d75b005b49f6abdc7e77ded6e419591451019ae528815c78fb0488562caac4ea90084bcc8468d63cb46544

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          6de9a529a257077a38c7d0704300053a

          SHA1

          da31585b6dbcb10d1fde608f6ae30ea94b22160c

          SHA256

          559860d840f3d3911929b6f74c23c864d283962062eb49132a45c317fd025629

          SHA512

          6f833b1291e75a7c16d6a8410009ab088bcac7ca73f28a5ca00dee23ce49311761bf2344837da746393f63695a9b028d39f92095198e4cfdeb83ffcc3cd35ccd

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          4c39211f1d7fa00cee52d122cf9dd27c

          SHA1

          f0f7b55e4a336dc585ffd9ac9de8c883948b5590

          SHA256

          ff666469d0dc903853e31c8a3677e254a915e3b7faab19c94e449e424ee3379f

          SHA512

          93373b5c1c28608bd03f11df459518e66c9f1798ee8137e10e446da88dccc1dd3555cd67e4b51f9955522ee80cc454c4732556749c08f8e75d29986be3bf416a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          9738301c75ac927a7a1de4c1abbeb1ec

          SHA1

          8a5d8128c3e484d04d39603ce36ac7cbf2a2372f

          SHA256

          33335eb77114c39ac9c38ad3b7a4736c1690f1795a37916be88e20ba1a692636

          SHA512

          95e5b8bf37a23654cdd58411f3befc4b9ed982d8f3c06d8299c0e858cf35f8b09a43f25acbfb25be1d767d0b13d6d002f3dad69d18c467af4cf049e649600d7a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          133e86f02647ea7be79e57cb1f1ff4f8

          SHA1

          45aa124093b6390bb1790133684ec88079f32ec1

          SHA256

          d1d283644483fefb08bd753ef911e55ba496c2ae9322c881b95d488ab6563ea0

          SHA512

          aab5acee33150a0644d422a2253559fd901496a2003d8fa99e216a2274b685fc468ffc83911f842261d7370f4c40b0ad8eed73725764303d29fec967ac4c298a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          25807f128058a9278906a0239e3590fc

          SHA1

          67d5c4ba42b5623794af2e17797368276fca3bcc

          SHA256

          186978d80e5b5a89aab2465d07df3b3f0ece14f8afd0ad168a423c404e9b5e07

          SHA512

          d17764d72e3213c406ef544445ab1a2f6527745c9349b34e566639694b8a18e6625ca466a72829185252c953b4c3c7277693c14516f7b094f9422c10ee45a0d6

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          85a87162a467f3659a47276c9cd97c1e

          SHA1

          0f993f71a11ff1650c221c15e031b0b611bf4951

          SHA256

          09f8c5884a77707ca12172dbb9f13fc107c4a5f495490046d622d2346adf49b2

          SHA512

          6189e14c58a9fae14dde261a98a9256ecfdc0e2073bd2d3cc58bf923d1bec47ae7bd9cbebb5c3ffa22bc97466ab3e4a6fd1f622e8cc8efab2bf428ccaa727072

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          030a697787045da054109a1a6ec700ee

          SHA1

          cf122bcc83d98454ddd33f5ad80e5833d2887683

          SHA256

          d269e20f8100091ad7ef635ccb4250bd994af346a940e69d944a418a13d73424

          SHA512

          e684b29fec6a2d3475fde0e3050247cd968ba43ea5bcd9d32e2e278a89612115d895f4066859801451240a1865434cb9556c1f8b168392f64a93b3f054c289d3

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          1118279246e630342c50bb835d170c67

          SHA1

          3edcaf5e49d180ba0c49b30b3b96ede3f6db4c46

          SHA256

          1eb2485480bc7acc4d1b59b6a174e6b3edfc30ce4e92003d6754db9637351580

          SHA512

          4e4bfd85fb10073c1262d3d54b35bf7fd027648ec148d753feaa74a0383f8f4eeee825f08e75655d9c4de0fdad69a3cf358d8d357888dd7de49833175f2dd847

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          6a9f051a2059c0cd8d1083d43a9c301e

          SHA1

          caf709a30c19ac05ff552c16e2e477a0cafe5d23

          SHA256

          b39e1771dcc7fe3b1ad582cff0cae1ccd38953ed88049668652dff1af82d1c55

          SHA512

          f83584132330e33457fc2d4fddf8e2dd150053053fffc2d1cd7d418a5b0ff00bfc5caedb9557f600b0351b136317b4284364411d8e263f4561848567069e5521

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          4fe3c5c53a57071ae6ba7bebf3d1974b

          SHA1

          5a2ab170a3a72986c82d6a08cbcc9f42838c4aa3

          SHA256

          98cfee92c5082dd5e84a049197acc48ff7e18a64a707fdf454ebf73b626eb85b

          SHA512

          558183739fef24ba222689cd74194b39470bf25baffbcee9360f2b4d248046d6384950d5610023a8545ac8cae467a43dcdd01d5f4c73e83ffee196c0e3248873

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          9be53646cd53dfcc32e353b378b236e6

          SHA1

          e5a4ff67df9eb381c83f101c7548900e6e024784

          SHA256

          1b3b454dabe2f9a919f7a90d4ed84bca32aa89708aff25367f384144ab1a941d

          SHA512

          bcbb9e54cfbf965675cdc01a31c344c6156eec0584d0de50bfcfd2bee71823bdf66c5099d9d0c4d8376bf8846bd99f9802530273ca7979e56fd77d9d8fc3b895

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          7414217ca3e68a951e51eac505383b36

          SHA1

          78cd83a076a3c3afd49afd1065e665ca1097f2d7

          SHA256

          356b98ab0ffdc20d14fcb7505fdad31c198c3b3af7cb7d314fc95543c5599491

          SHA512

          23d7c2114bbcbb03a8fa91f8b1b9ae027067795d912417ca873d5e056fa614e9c59392ae6b766f57c9f251b96b2b878d1e9dae320b303642396c0653e2a681b6

        • C:\Users\Admin\AppData\Local\Temp\Cab3594.tmp
          Filesize

          68KB

          MD5

          29f65ba8e88c063813cc50a4ea544e93

          SHA1

          05a7040d5c127e68c25d81cc51271ffb8bef3568

          SHA256

          1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

          SHA512

          e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

        • C:\Users\Admin\AppData\Local\Temp\Tar35E5.tmp
          Filesize

          177KB

          MD5

          435a9ac180383f9fa094131b173a2f7b

          SHA1

          76944ea657a9db94f9a4bef38f88c46ed4166983

          SHA256

          67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

          SHA512

          1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

        • memory/2100-19-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2100-17-0x00000000001D0000-0x00000000001D1000-memory.dmp
          Filesize

          4KB

        • memory/2100-18-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2548-29-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2548-27-0x0000000000240000-0x0000000000241000-memory.dmp
          Filesize

          4KB

        • memory/2704-23-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2704-30-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2704-26-0x00000000003E0000-0x00000000003E1000-memory.dmp
          Filesize

          4KB

        • memory/2944-9-0x0000000000230000-0x000000000023F000-memory.dmp
          Filesize

          60KB

        • memory/2944-12-0x00000000002E0000-0x000000000030E000-memory.dmp
          Filesize

          184KB

        • memory/2944-8-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB