Analysis

  • max time kernel
    140s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 19:09

General

  • Target

    $PLUGINSDIR/nsRandom.dll

  • Size

    77KB

  • MD5

    d86b2899f423931131b696ff659aa7ed

  • SHA1

    007ca98f5d7921fe26fb9b8bd8a822dd5ae09ed6

  • SHA256

    8935cba8e9b276daa357a809e0eca3bebf3fdc6d0d3466ab37fb2cbbfacd3a94

  • SHA512

    9a4437ab484e4e22597c642d21b0107a063a208a582df3a5bf276466ad8d0ba9aeebac6de8dcf1372939984bb187d58e94c799918cfbe80e85c958bf0a537fc7

  • SSDEEP

    1536:/lKXi95r2UwOpUtoqoQvfDrghNT+2w8mbJ1/NfSttVx:sgr2eGoqVvbaNXubJ1JI

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsRandom.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:308
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsRandom.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2108
      • C:\Windows\SysWOW64\rundll32Srv.exe
        C:\Windows\SysWOW64\rundll32Srv.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2232
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2356
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1452
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1452 CREDAT:275457 /prefetch:2
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2796
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2108 -s 228
        3⤵
        • Program crash
        PID:2160

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b3cc90df5d41951c5541330125a0ccb8

    SHA1

    157d8862f50128bad5800b23130df26e9aea6149

    SHA256

    4e83af15664acc40a6820e6ba361f9c5ec149d096dd523d0f42914b4ac275afb

    SHA512

    484cb253fe51e86c2cc4f4f5ccaddb24ac60697c045e131e9e90fc38e70ae500ead51c2e6a32d88951a340eb467665d438f145bd10dd77f5c88e51fdcfe26693

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c6a91432492e70d868e9cbe09f11eb6a

    SHA1

    af24fe504ec11bc80e3a064eddb9f1a449e8bda6

    SHA256

    90bf715c27aeb47f94e82c166e1e88ab76b487c4acb59a2fba8760a37981b418

    SHA512

    8ad4f2883829f1a6f6338749f2eb675e42a6de2fb1420e95aded9ded0856cf38dba73beb79ae7a3be6cc61858af012fd739697613b0b290e24677ffa52b2ba49

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9dfdb625c7f44867ccff9e610ecbe183

    SHA1

    7a79ac73627df069368e1794e8757d00ebc36dd4

    SHA256

    a34f4aa3ed9b1f89949dc278f7861c8204a868762822ad4c549984d7a0378f8f

    SHA512

    64a26b2c522c0c6881538e5e507700ff89c217bd8aa00cb4bdcee2da3c79bbaeb4ccaa435ab3c522d4b83eca4f5aac7512477cfa9cf200323d630cf970dd323b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    28a41f4ef09766a02635c9b02fc47db8

    SHA1

    4e13d5561bc22cb4766e06cee2339b3c04781ef2

    SHA256

    f19b664f0ec7640ffbf26da915a2c4f2ba08b6cf0acabade0911979648dd35db

    SHA512

    96180d300e9e64f4e00a3bba44eb7e1320296802733e2e86ec597a22883c3611b31959cf772aa242077457c31545848dd5514bb5faaf08bf147fc2d46cb7f565

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    28a6af73e9cbc3159773858d6087995e

    SHA1

    f1bab7bf677df976a4c2849d6564ea4f6579063b

    SHA256

    b3b93ab1effc66fdf3b743093276192bc9c022cd201f2098bcd1a72292f5a8b7

    SHA512

    aa0d46ca29b9c6e4d334ac13b31208b0cbf611f397ef58971d112e8289c4ccd0d35ed118d68a311cfd49e673f290d1565314855438d7866bcead753543f64507

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1832e2c91474c064950da0c67490c02d

    SHA1

    f1857c4d7a9ad42bb2510c4d426aa60e5d6e742c

    SHA256

    09bcd3819878a040689b1643ea62c916988d8a80381c176476c3f10a1f7c77ad

    SHA512

    157808e848499b34d6bbbc69b2bc5776e7fa9766e8197213823467614e33fe4db97e2ed2617b1b766ef8c9ee776c608175a7802f998ac19ca11867d821fcb176

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    159be1c3b0eed5f228d41360e0a63981

    SHA1

    f5673e46757f7eb95a20cc06a29919a26e849d1a

    SHA256

    1081fea46f7f242ea97a0d7043d5c6be2361fb01c4ab35deebdf1f9bbb811dfe

    SHA512

    3f91c3927b5c710b4e6d709341774b9ef71a2ca5d4cd32bde170b94ee79b36abd4b2207f47259cd41054f59e61dcd2526449629e5b238395069837a24aa728b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    58e9237c1f90a0c2406a0f7e8770f299

    SHA1

    056c1933b11f6ef5cd3d0b8dd80d50c217022583

    SHA256

    68d5b789dc59eca76379512f53909c75ccbb5e926d943f8eae7b6bf3bc21c3f4

    SHA512

    5fa9673d6671ba9e9b2562a38cd43066f99d611e527540c2b35a995fe10fdc41f485f45701c0d1b0f465d8fd4e6003d12d1afd2b1ab54a40feb50148ae5a1d55

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3f67f8deff0962b5b13256d319bd136e

    SHA1

    d37b0bacfcefd0eb3f0e523c001bf23b0ac13fa8

    SHA256

    9608fd74f1b050ffa3a715ee7735b06ba560ecc3ab38647420248a62e697bf37

    SHA512

    8be3d9bcc9122eb1e93975a5d0fd29e877a3d64af92f8738397a1e4c6a83f0efa43113db3546598e84bfa5756db836a8fce6504ef8c1c65bda42db1590d55f6e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    02adc9d7def853b0a7cdc50a12e18561

    SHA1

    ef12c870112e5dfd8485fb08e1a924dc0c6c94f3

    SHA256

    e3af4906f65b429d89b1ef348a484b5f09e28b9db02aaa83169b8cb8b46852ab

    SHA512

    334cfb70935a22cc5511649172a59475bffbdbddebb0c0353c9c508357efb77d133f7f850940ffd24eb326ca31dc0a7d67e5d8990710e17b09c2e6cbc89ead20

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f8c8cb52dff2229cd0a3d10b27225f15

    SHA1

    ceae56ba7e7245940c85cd9c6565449ecf2867c5

    SHA256

    b765b9f386d325beb625f231dee4274646f8dec1152b51eecdec671d0c872f7b

    SHA512

    4e76b7829fdbddb92dc11064cdc974b3e677991cd20911a25f0aecd8822dbb50ba94cbc5a1aa06f2de2ae958b4c214ebc367732a3ad9a077da75c3e53ed35fd3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1469991efccd06ce37a5d18c8f24cd04

    SHA1

    819128399ba1d12e82eb39ed863d7760ab50878a

    SHA256

    b0422ba4f180e2b0992ae22fbd3b65b53d945f7474507ea18b97a23b560c306e

    SHA512

    6c224d61018617f417b43605176124f489b719584077c9d78da868b0b3546bad894307376fc82506804d10a53b639e5e0db5ea0ce0d6071926e65bf0a4d8c54c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    019ce0e3aa0793f9983d5a285b5a480f

    SHA1

    dfd8c6fcdb1847e513bb330084bf85f94d10e226

    SHA256

    bbafb5beb76da97de02ea5333d238d973c3c229f4bc152cc6a18abef31858449

    SHA512

    9cfb327adefa72133f56fde2fc8a8eb691c0d1d2f5f418379ea43c2bff3053c886a37594455cad2006ce108cb95635b7c95f5cb80e7fc998f865944951a462d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b3b757326e4c58e7c7962ac55d6dcda5

    SHA1

    51e883c45ea7a4042544d65cefd5ac93f8c81b70

    SHA256

    3d9e1902187cadd9887cc7062fcce3eeca92dbb931c5c78499152df8ec01d28e

    SHA512

    e6ba2a757f7cd8b44421d404044a0296ba912f0353158d85d08fdaa94fd530e6ca47d00c4f9aa0841f95e0ea239d942d7651c47ee6192085d1a194260603c765

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    669310a8ff4195aab5d6e2a193230c9a

    SHA1

    5e0c1179a06c474b9aaa200787223c865444c12f

    SHA256

    f1bc2c3d66c6bcd06fa451c0054f9f63147efb9d4406a8457f03416ca4b745c7

    SHA512

    fb0b4fad2cd2fd02c3c5723f9156223e57b9ea8d647e84bf73991d16eb6c5b64ffc22842f781af12d1fa73ec16aa74698373c9aeecc29501f10f796be43d3943

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3458857751d8ed2dba7ae17959801dd0

    SHA1

    81b316c870881c734be821fef88b0c4aa6df0e69

    SHA256

    9ec3a2eacc3b16817ac3661785f85d9974a92acda819482dd67c852294f33cb0

    SHA512

    75b0155fb85769853eb65d0852f6feee64ffb7578515242b378060f8569b8f66c07855962a20431e2f504cbed5ee7891efef4a15633d3595003d172129e21afe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d4a22a01b743023d155c6400467c0d19

    SHA1

    c69e8f91cab0b310ee1b80509d2a61acfd4b8a3a

    SHA256

    0e9eb8bb8d6de4697db804ffd504d3e58e441cebe79d7e6020a5062fa1234d67

    SHA512

    8e457ab155cddc0b6be9f50aa550d8ef992c8f133f2591c831254d898c7c2adbc3a4088d304944ca45e94a90b989afbdcb171ef0646998af04ea8b8c32cfcba5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    769604e774004b4ef82afe254e1fb068

    SHA1

    cd2161bd3aaddea0bb5b8123682c1909ff520fb9

    SHA256

    58a8abefe1c96ef2a195dceedc412272ce9580309128f4a5ad5366b1c5aacaff

    SHA512

    560fd2de56cffdaf6f29f5f8773a4f89bbbdb9332cb929569a5282d8e63aa46b2b04af6ba974de85321d61aa652016e6522df6968ea1fa78cf736148223ab49e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f147396d9985f9fff9f48f1571797c57

    SHA1

    33d53c55b9b3d8d90ff14c5ee8122d6a4e058ba9

    SHA256

    1d969d6a0494088ca01e18236352247614cd4ba701b3c616b04b8507cd63a562

    SHA512

    3b02e6d3379440890abdc9bdc65bb48b8b8708696671008dfeaac12060b6bb2088012c08b5f0a2a40a258f48ea1658246f6c9f37a87e0f49b59afbb8f5fa2985

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e742f1070898aa4e7ba4c7a793c1f55c

    SHA1

    d339044ed285d1b27751a0df44c0dba4ccd87c19

    SHA256

    7984e994c5dde51d5df12457d942173202beb0990edbae83bfc38b624f429c4c

    SHA512

    db1ed81daa83b3922327fc3c7f61d720c870de1f8078a368f4d274c6a3c522c0c485b4a493216659b65f6857e8c6d139db23903eebf4f542bf455af5f31c357a

  • C:\Users\Admin\AppData\Local\Temp\Cab396A.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar39DB.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • \Windows\SysWOW64\rundll32Srv.exe

    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/2108-3-0x0000000000180000-0x00000000001AE000-memory.dmp

    Filesize

    184KB

  • memory/2108-1-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2108-22-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2232-9-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2232-8-0x0000000000240000-0x000000000024F000-memory.dmp

    Filesize

    60KB

  • memory/2356-16-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2356-18-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2356-19-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2356-20-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB