Analysis

  • max time kernel
    117s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 19:51

General

  • Target

    fc36d98c494914b306269053bdbd8e2ac5a5b941ac5c6372918ebcb247648d98.html

  • Size

    336KB

  • MD5

    6f8c27af4705ad7e74cde7af8c8abb38

  • SHA1

    55684e288a2030921f4c0db52655819fa787eb97

  • SHA256

    fc36d98c494914b306269053bdbd8e2ac5a5b941ac5c6372918ebcb247648d98

  • SHA512

    2275b4210dd51d3b6e0e991efa7a84b11fd881743f018a2a00331f0117bc667cb42ba1e3dab8179b95dfc45b2689cf5a006bb9f9b423550f8cb4b4944c013289

  • SSDEEP

    6144:SosMYod+X3oI+YCzsMYod+X3oI+YnsMYod+X3oI+YS:P5d+X3U5d+X315d+X34

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 7 IoCs
  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fc36d98c494914b306269053bdbd8e2ac5a5b941ac5c6372918ebcb247648d98.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1972
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1224
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2508
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:1468
        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
          3⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2556
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            4⤵
              PID:2396
          • C:\Users\Admin\AppData\Local\Temp\svchost.exe
            "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
            3⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2440
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              4⤵
                PID:2436
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:406535 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1056
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:603141 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2896

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          8315560195e5ec68af18280d944552d6

          SHA1

          5166ba3050bf2e74c073525c468e47e030a7a348

          SHA256

          539aa3da43bd9e275984117f24bff217aca7742dcc675f7d0f71085a85293245

          SHA512

          b132cc99ad4dfccc3a92414069327cb534910ef882ed2c2514989d1b4bdb60f3956a442a103b871165e843fe624d4e46d82c1f4350a1b8ebe0111bf64c2170eb

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          0f3c2137831c5faccc731284259f794f

          SHA1

          3994747926f549ca903b0f018b983e92887bcc0b

          SHA256

          9f57f478e7aa2dc514c38fe8aef86c5ce9ffc2e49773fc106b81a59b3d7c69d9

          SHA512

          3e17a159064b85fe92c3b4076fa0e8e79bf21510d6fb749c66335a242c213b6a9b22ca14dc62dd42df0d7e425776a6769bcde95b99797b1cf3530881a99ae86a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          5fc416bbbac99d8d9a85e627250cd6ae

          SHA1

          b20ba0cc87d2293d11519fddaa27625576594949

          SHA256

          f078d27de60405be5fe233fd46cd74eab92d284898e73bf6227f3fdfa61f982a

          SHA512

          863de7dc2f2b79606ee8e2d4a75856917c83cc0839a63ec87ab36e0b952410510504d8b88e9f3d1966432a3c389a58638151b7525c38d85a19f356fc3a88d14b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          72a7893916f9c78f7b5d66a1c4603368

          SHA1

          441b21a1bcc56ba9588292ed838e920ebaef19c7

          SHA256

          fa103bbea979e6b89fa054efbb6753137d42bc71880f01d966b748a0914a8ca1

          SHA512

          23e9bbaa999c936da735cb0257588376820aec8a1c219a5decd34f0555d928a0cf84fc224dfa1673f3d7a33968e8c5ffd1c2530d7e5dda44a8c88a3126c37edd

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          432e8e9f2c9dd531f72d5fd0740799f2

          SHA1

          e8ace6e24eab0fe5c4bc2b8bfbcbedb71a040b02

          SHA256

          0414b1569d9543c1c6ad12316e060f11a293cbc364061dfca9224c2e0ce946b7

          SHA512

          ad812e1adbffef08fc98659c8297a28286034f5b13cf885f3fa65c5841754a2ab74d6625cfbdf3e15f53151dca524efdc924eec9514962ee923b1deea6cba59f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          91b28966322d6fd406b6b94fdec1ceeb

          SHA1

          b3ba285ad8fa3acd442b43b036aa132c0cb130b1

          SHA256

          5e7dd35a6cfd198c0f2b3a79c19b6e670fc63ca4607c4677054a99d9c5a4307f

          SHA512

          1c4499e409628236039326d2b18bffa8799eb6d7e99664b3e035b0edbf281073d9dd4bc329a6d7c4eb6e5ba9e18201b82c1908281853e143117e97c0875125d9

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          ca32b8749bee98521c4718dd3e505a08

          SHA1

          41b5c401e3d91e592e8e23fec1a7920be2292c07

          SHA256

          18dffee9c2e8289792aa85a0fb1e595eb0e283b1cd6ef1e93d33645edab9e50a

          SHA512

          ae106d686742c6bbb1e449ef26186c6b05c72693982f6fa73207c4093bcd9e3357d65a21135ecff502aaba1295c1fed7a93c84f9f5f6c440937e63b3e270288d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          41624b5e7b71386fb666b4500ef6798e

          SHA1

          8de3873caa6d2a2b1b824648cb2a05cc6a0eae4c

          SHA256

          e51d8c901af235ae007ecb24f314354069e6e568dd32c2350f10c2ee27e76ded

          SHA512

          ea1c192826cbf95497c9bfca82b6d1726022cf4e23011e57f6422aceab96ba9f5ee1ab3b8f2118f9e6fc8ee5da9e8bfedea5c099d2507e36529f408e3b889450

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          fe7ae1d789fd2ec2e5edac5b88d5cf3d

          SHA1

          252cdafa963fc30faffcb36236a5f6cfbb210fc6

          SHA256

          7fee1fcd74d87868798d875a8a4a73a8ec16e250cba7e30dee9ecfc814b6f98d

          SHA512

          6452a75c04bf7fcb7dc2acacd8a4e024fcd0df902286ee6f2a83e8d074a8058d09d48b8f29f567104afc6a166e067cefe162885ef62b0511ba1cc3325cea8d10

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          93e82ee3572a0f55182efed6da5af994

          SHA1

          0c8706bc98edb5b96e0834a59375f119b628deea

          SHA256

          a4ef75351abf0f94ac92a76438ee55dd8164af311071451da9de67d3f439f24a

          SHA512

          057e5e56a6bac8734079882163a5cea5d2f03cbe25859e6b3e9a3aeb28d158945bcd7d7d3f7e00e3fd6c6c99e5387b23b8be988249fa2cdbf64a24355d3bd13c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          58924aea854aced231db36ac1e0483fc

          SHA1

          d9d677c1cf947e06bdb66d31f6ccb08f6109b1e6

          SHA256

          627cb2006b7a2ee27526973ed64d3bea4e304f2913af93f9175770e134992652

          SHA512

          e5f2f98624b00c5967ac2a0707e795b2ddacf21f73d57c49685c4a012dd83ae2659d51852f0c6585351a53b5fff3cb335153aa7815e2da625a7bfeaf9b2d81e5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          95a735f8d17a59244492502a95a8ccb8

          SHA1

          96bb2490ded00d9df7598efc0abfe6d9d7c56f6d

          SHA256

          3b42feaad3070d65394f7818fcaa60cc33575124d420083d7b575373777259b1

          SHA512

          5b2d2e8cde58faa772159901878066adcc719f64febfb84aadf8e7eeb46a09b8ff126b1e1f6f8d4f683e9b33391f8644f9872c96a90d7a071e30da924cf847e9

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          1c010646f40a6df38bc8306703be54fd

          SHA1

          614e86fe8cd743bf5a989b051418eee9ca08fd0e

          SHA256

          4183734280596947c981b8ca9d6903d469a440406b3f89adcc8aef5d8f273279

          SHA512

          76e3ba67ec714cdbc8d5de607d5c1de11cb0e53f1bdec67f2b70033c344b51199da5e0ad9d94db7d1709cddf6d75f12e13b92e1c6dd416a8c5315f506e2cea27

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          f9c1f6a5a2d56ac66e6f97e92b9bcd8e

          SHA1

          94c3677c249ceb6305dc2a3460f0be5b57973a62

          SHA256

          98643620073667818f11c95996b80e6a34b0bdde5901eb137ee5d12017c44b9e

          SHA512

          4c737dea577f1b7d8ce5ab2bfbc2391a93cae46213f7ed59d11e3d7bc9909c2a94240e28d11219002ed19f09fe7e11b66399be4da196668f5f2ccfd2abed0833

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          286240af3dc00e8e222e5cc8ebd137b0

          SHA1

          4aeab1c30c48fb66b8e608aba33d17ed58f8a8ce

          SHA256

          df8f11174b63829cb17a9122f519c63d7257a67808e113e0b661d134349e56cb

          SHA512

          394edd41bc17ba110b15dff8f8e5db3d25d14cec1fee5a49345485abcf48cc8371fe3f805ca4819f98e1d4075e0eaeaf8d442452c443d7632480f8e4b9ac75ab

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          e40a4bdf474ee8e91221a6daff6550af

          SHA1

          02a1554bf3272ce43b3a0475f6e873b2ae13f533

          SHA256

          8ad4a8d588f3ea18790a58e8be363f7c8e25aa50a99df30006efcb6e1a0fadbd

          SHA512

          a8b78265426092e99d76e6d9600ac9d63eb39f431fe194805c62c5bd3958c4cea3bc93cc4e476a4e19faa90630eb41bf3a4779ce1fa2b21286b3dcd16beaa373

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          84f2993da42dd8ae7c7d3fa7bb21e79e

          SHA1

          3aed22742651a0d9f626f50d41bb396b625781c0

          SHA256

          7a9f1c06c38360e33166d31b46fc5a8f28b4a6145414d6ca145cab227f30b0b9

          SHA512

          a36f51aea091b6006c15669c3e62954eb40c53ccc015f12f05b410977918ff576ce0513fa597ed9c8c0d7d0ff7c76312b700ce5ea8adc2de96b3420f35136593

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          344B

          MD5

          9d54311e48d699c055e3bde8ac553fc9

          SHA1

          69f21107991a53218a58894b3a7bc6888506a6d8

          SHA256

          3e84e690c456ce0a5a231b6880ba1116d45042c332de2f7a663e1efb5ea031c9

          SHA512

          768da30040fed50ab367a4f75514078549f5f0a3cf579384d11b8a2627d08a924ec80ccc00e13665b8a609dbc4a813cf30b2197de2aeb0ecf71f829ba272765e

        • C:\Users\Admin\AppData\Local\Temp\Cab3121.tmp
          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Cab31FF.tmp
          Filesize

          68KB

          MD5

          29f65ba8e88c063813cc50a4ea544e93

          SHA1

          05a7040d5c127e68c25d81cc51271ffb8bef3568

          SHA256

          1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

          SHA512

          e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

        • C:\Users\Admin\AppData\Local\Temp\Tar3212.tmp
          Filesize

          177KB

          MD5

          435a9ac180383f9fa094131b173a2f7b

          SHA1

          76944ea657a9db94f9a4bef38f88c46ed4166983

          SHA256

          67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

          SHA512

          1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

        • \Users\Admin\AppData\Local\Temp\svchost.exe
          Filesize

          55KB

          MD5

          ff5e1f27193ce51eec318714ef038bef

          SHA1

          b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

          SHA256

          fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

          SHA512

          c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

        • memory/1224-9-0x0000000000230000-0x000000000023F000-memory.dmp
          Filesize

          60KB

        • memory/1224-8-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2508-15-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2508-17-0x00000000002C0000-0x00000000002C1000-memory.dmp
          Filesize

          4KB

        • memory/2508-19-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2556-26-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2556-22-0x0000000000400000-0x000000000042E000-memory.dmp
          Filesize

          184KB

        • memory/2556-24-0x0000000000250000-0x0000000000251000-memory.dmp
          Filesize

          4KB