Analysis

  • max time kernel
    134s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 19:09

General

  • Target

    $PLUGINSDIR/MyNsisExtend.dll

  • Size

    596KB

  • MD5

    37e4e1ab9aee0596c2fa5888357a63b0

  • SHA1

    a5dba8c0a1bd936dca2b6a81f2dc9a3005f1a2b6

  • SHA256

    ff4b245fea98cedd881ca102468623a449a0b40df0c557dd8a6ea32e788d56fe

  • SHA512

    5cbab2872683079c6cc09423a2baf7107b5ac5731f336cd237fa93a4a4ee53a127963dc0ec0dbc6168b9b3d2c3a881c7663ce4ecd84d964628dd566395d49bb3

  • SSDEEP

    12288:1QXznhWxifqPG8yDAay0BQeMrtQW27ZJ6ObWTE5lqtmsVsIdj:1QXznYybPJnWTE5lqwsKG

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\MyNsisExtend.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\MyNsisExtend.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:1952
      • C:\Windows\SysWOW64\rundll32Srv.exe
        C:\Windows\SysWOW64\rundll32Srv.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2512
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2576
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2584
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2584 CREDAT:275457 /prefetch:2
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2244
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 240
        3⤵
        • Program crash
        PID:2312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    b98dedd8ab0db3fbe46c3ce4820a2bc3

    SHA1

    a21e745afde32fc584aca40015520002da38b730

    SHA256

    e90b96c80667fc42e44120e562a8f8b9a90cca807161be184e08aeb486de1e51

    SHA512

    933f86f840dd729bc197a7ff1e56d1d7cbc1084bfd627e277a4765e02a572d614bfbc2d984084c7c60f809f2bedb5d1e0a74b1287238e379de9ebc505d6e85e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    0e911fd275012c00e64081dabd3793ca

    SHA1

    970954b49184ca8067adc1f81229f183390820b5

    SHA256

    983eb88b8880f40ad916c07caa3b7ed3462cf56110731a42f1ef79e96d6d734d

    SHA512

    8c185d701ab2f10f596fbf24e0f857324ac82b7c08a32e571b0f2bfcc2c48aa8fb65238144b7d0919ae6f28611cbe5bf3bc4ab2430bb7a7548fb60ca759802b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    8217f4dd3d3693ee5f21f1f82a465535

    SHA1

    27424fb08cb224cbd6143d884e2b5e396209faed

    SHA256

    2b1c75ddf7306abdecee0a0670534ccc4a9d95215641333f89f497870c766c59

    SHA512

    656cde857b3e41478720f630c2bdc5bc84c4d91dc6c2142722b0e86c790403c361fe81a1996591c9e1f66a257d15ca464145fe3796ff8659d90b2189f93e872b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    97c52ac627c22a2105be6ad6d52b6531

    SHA1

    132cf5791d1e5ad5fba1db6168a4405a8bc17f0d

    SHA256

    19b6084074cd73c8113671e0ee80cf8f3ad8f7f228a55d49e94d995c48799968

    SHA512

    959e8c3681c4d581223acacab0bae9ae5897b1cfcb6fa9165a44d799fb52f148cfa1eb2bd191c3b6c9a48fab128bcb7b127c2b93c20b3e763b5da69b873adfb3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    28c1a3244bee725e6ed10393d705b0cc

    SHA1

    ef8986562fb1617b4d08b9edadc20903787dca74

    SHA256

    6ee2d54157d76dc987f231bea2905aa2ca0ffe4015b7672d083542ed4ba4bedf

    SHA512

    f694fc020777c1a74aa138d3671d42e22423b674303c578e0a4c47207d7e23a3e1a481b59b6a996e024dcf1d1d79aeaad7574672de9a408bb2a23252e321fd02

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    b918b745922ce6aeb22e0f88367cbebf

    SHA1

    339966d9025cbdb36b5a3a1e9b1f4d9538538514

    SHA256

    016c47e855af10aed211122b61210e4c7bdea0c3cff2f5b2173a8f8003d651e4

    SHA512

    0920c9c03c76244d0786b0403f46168bf973e718e905990cf17b08e917b83b877fc4404715e0c33171c19636254018769e0094605ef4f01da429db9e0f9e7b90

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    490d14ca5881112fc5a6f5bd1e1b352b

    SHA1

    8099bcfe1ed14df979b678bccca1b6cbf6181914

    SHA256

    832b788e2e4ad22e9e13596cc2e5d1daed6ede7727ccd2f958a7f53d505fd8d2

    SHA512

    a2469bf3bf45b32e00447c83d7f18ca6894d4f1ce3a394e3032b5f2053ac5de9cce608dd9539ee75700aaab9d4f23fb3ce7b661b5794df77755d430f5d803bf5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    9325d878abfb8d57c250833bbf0426ca

    SHA1

    b3bdce9a67a5827b3ee6bdb247b7b6883e9d5c8b

    SHA256

    baa46ea000a6ab8abe58f7ce12ef93c9a7c7fba73a790ed7bac5bb125ec7254f

    SHA512

    b2d15875a2ec2483e223a9ef7791835e71c53a4e6f517f24e2280679b84f5cc749acc789b4cdd8f356275cd431b666e189568973e41ece88fd8dba1a690f6661

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    b436e8a11578291ba6ad490b494cba69

    SHA1

    70c5d5c097f10347155a85026fbeabc7d17163be

    SHA256

    bb12cfb9a780e5b38c9ee6758eb8ad22c59430c498cc9b95f05a7b77e2a19cba

    SHA512

    9a21b743b5cdbe8d8c0fd893723104fe336ebaf1686c9914e949927f2252ee79d4eae0b995db38989d1d95b62b8eacac35fc04165a1359a120e57b8607d8754a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    605178fcd9dbc9998f806093808873fe

    SHA1

    643fea1671010eaa7d4ee566c2119c4c71f24835

    SHA256

    286b1a72e53b231a85f37fc15fa56892fb0c28cc3207e99e4c9f1d8aaad8c9f3

    SHA512

    e9a1db499b68810b494085e5dbe3a227988fe051d90601baefc7491e2f1ab2a7acad2ec9c2198fd0dc7c3b53d75ca41fe7255dcfb459c42ff0513693880b6193

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    5b0a01bcb47241ada5c75f902892c715

    SHA1

    aa1388cf3d89d42e2c4952ade564871a06d798d0

    SHA256

    d24ccdbf6e00e919fe052045a7cc87f8de9fd431b6275f4f79b48268e599cb72

    SHA512

    f8b30220d86b24929e36c9b9d59cea60e414c5f4d3ad92cd0efe65b115ff100da53638a568577164617185b4aea3e1c6e8a95ce7544ffbbf87260b557cfc8c8f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    4256febcb91bba69890e8b2c305803a6

    SHA1

    0a2d8d6c2d4bfc97c1df0c0591e6c5cb4b9fd81f

    SHA256

    55366405ef6601c5b1e0061460985343054618bf0508542b7055dc0ebf7b5a07

    SHA512

    f6a21bee763c930c8099d8288de5c1b7eed206648227771ff7688222eb35bdaaf910f5c22a666847e578ff11aeed60207de1ad6f1949e11944cccfecd7827bac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    da3f11ed76d28adfe2d8db2839f6e65a

    SHA1

    df3d36141111d984fef37c721adc565f2b999bd8

    SHA256

    cf6cf17b9501974885ac6522318b76712b1f49a9718647f7f4c35b2058489906

    SHA512

    17cd360c2b980303770bd9ad3d1379b9bde0e602d2323160eca239597eb7dbc5d0127edd38783bd5cc3780e02cde88fe38abc7325aa95e66c35b43c0a0e77425

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    026abb12bd9d6c1a1582d3f5d17485ef

    SHA1

    246aa0aa5399d070afebb30ded29319211698aba

    SHA256

    470d7c86fd8063a0e6c83c71a8c86647e08275eb1eb8b5ddc0bdb5e3bdc955f8

    SHA512

    95de0b35825b3597a41b96b85a8b0c2b016c4de6b1a96c3707b957750d6ca200f02b4643085e4ec04c94a1e1afe12c3060bbd44138e0085691af3ab5ab18a2db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    91908bb6f678e3ad714d21bc8d6331c3

    SHA1

    fdaecf9ad42882ffe0815979900a4243427607e1

    SHA256

    f54ab5ba50e6183eea1b4c7583126848903dac1dc8532afe4e1c9eb0045da402

    SHA512

    c265935f600948b457d39b4f6808aebdecf66dd30c1ee08a1d51c31d98c099db0457728c610f20c0d27ab5744d1d822c724d869e00aad62580307f5e8fad5c16

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    dc369bc48811fa46d829da2af35911a8

    SHA1

    cb0b7561724cf892ff7a5f495ab59b91899c33a8

    SHA256

    987c421540518e47fa1b2dfb2e8aa14adad0add48416d235c71a9fb19b62999c

    SHA512

    849de6a496c057a2091a25f91d45ecd080ff540dc40f9f214587150ed4a512eb74ad6d0284d63122743450287d591c1b9173c23d3b167a62e607907c0291b435

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    1687cde45125c2bad8dbb2e06368d176

    SHA1

    4061d526d4c0472b05324d97e3861d93d42ea6b0

    SHA256

    9e566b4f13667cf957d81f432d5bb0599ff0af2b7847b5a8ebcac5be150f398e

    SHA512

    0fe0e19ac43c93db57cc2235aec62c615a1015f1377ac020663b7734336e21fbf0d47702ec0db3da4b66f07e86fa419767f99e177a414f952ac44f28f987548a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    0a4a9eb979c872e50c180ecda2a6593b

    SHA1

    6d9976bf6f0c671327e87150100b237eea0a300a

    SHA256

    246682475c56b75bd9b670a649be5460e2928e0298f436b56a42d81b062a5995

    SHA512

    da261bc7e2b7254f3d4fa7362719d5b140bc26bed73321221d6e7a22325322e81de488318fe68f3f22c7031105555f43895b447eb38e31454a496ebae4526cdf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    440c268de4fdd79c688a9996470895b2

    SHA1

    317be640c3220b9f61ad0a406b95c6776cdfb47a

    SHA256

    44415377366836369dc80b711e121f04ef127422337cc94573aebed470cb9928

    SHA512

    4bc45bcebe1fbe5fd9fa5f1e7dfbe8a6cf7cac01e12357a911a567df34f52385a578231978a616abf57bdb624375ccba24b4fbaae489d74268cf9d3033e90298

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    73ab87736c800f4eb8419c692a85e598

    SHA1

    38f2a83ead21bfd9b8ea19d67a87bdc032a1e392

    SHA256

    3cb1d3186e834e5fa5380fe70b730addafac4073c4afaab99c9b6e79d6e032af

    SHA512

    e880101eebe482ad8c533ae0577c9e4065e505ddce1906bcb696db80c3d37a05a9a0198325f661a271dcd7832383fe7fdccae83dd70dc76727032f92940f7154

  • C:\Users\Admin\AppData\Local\Temp\Cab2992.tmp
    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar29F4.tmp
    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • \Windows\SysWOW64\rundll32Srv.exe
    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/1952-444-0x0000000010000000-0x000000001009A000-memory.dmp
    Filesize

    616KB

  • memory/1952-6-0x0000000010000000-0x000000001009A000-memory.dmp
    Filesize

    616KB

  • memory/1952-455-0x0000000000220000-0x000000000024E000-memory.dmp
    Filesize

    184KB

  • memory/1952-7-0x0000000000220000-0x000000000024E000-memory.dmp
    Filesize

    184KB

  • memory/1952-2-0x0000000010000000-0x000000001009A000-memory.dmp
    Filesize

    616KB

  • memory/1952-5-0x0000000010000000-0x000000001009A000-memory.dmp
    Filesize

    616KB

  • memory/2512-11-0x0000000000230000-0x000000000023F000-memory.dmp
    Filesize

    60KB

  • memory/2512-16-0x0000000000240000-0x000000000026E000-memory.dmp
    Filesize

    184KB

  • memory/2512-9-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/2512-12-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/2576-20-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/2576-25-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/2576-23-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/2576-22-0x0000000000240000-0x0000000000241000-memory.dmp
    Filesize

    4KB